4.3
CVSSv2

CVE-2015-8736

Published: 04/01/2016 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x prior to 2.0.1 does not reserve memory for a trailer, which allows remote malicious users to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 2.0.0

Vendor Advisories

The mp2t_find_next_pcr function in wiretap/mp2tc in the MP2T file parser in Wireshark 20x before 201 does not reserve memory for a trailer, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file ...

Exploits

Source: codegooglecom/p/google-security-research/issues/detail?id=655 The following crash due to a stack-based buffer overflow can be observed in an ASAN build of Wireshark (current git master), by feeding a malformed file to tshark ("$ /tshark -nVxr /path/to/file"): --- cut --- ==3325==ERROR: AddressSanitizer: stack-buffer-overflow on ...