Executive Summary

Informations
Name CVE-2015-7830 First vendor Publication 2015-11-14
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 1

Nessus® Vulnerability Scanner

Date Description
2016-03-07 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3505.nasl - Type : ACT_GATHER_INFO
2016-01-14 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-0109-1.nasl - Type : ACT_GATHER_INFO
2016-01-14 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-0110-1.nasl - Type : ACT_GATHER_INFO
2015-10-29 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-683.nasl - Type : ACT_GATHER_INFO
2015-10-26 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_24e4d3837b3e11e5a25068b599b52a02.nasl - Type : ACT_GATHER_INFO
2015-10-21 Name : The remote Windows host has an application installed that is affected by a de...
File : wireshark_1_12_8.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html
http://www.debian.org/security/2016/dsa-3505
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.securityfocus.com/bid/77101
http://www.securityfocus.com/bid/78723
http://www.securitytracker.com/id/1033953
http://www.wireshark.org/security/wnpa-sec-2015-30.html
http://www.zerodayinitiative.com/advisories/ZDI-15-624
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11455
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=72497...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Date Informations
2024-11-28 12:50:42
  • Multiple Updates
2023-11-07 21:44:28
  • Multiple Updates
2021-05-04 12:43:05
  • Multiple Updates
2021-04-22 01:52:20
  • Multiple Updates
2020-05-23 00:47:17
  • Multiple Updates
2017-09-15 09:23:14
  • Multiple Updates
2016-12-07 21:24:55
  • Multiple Updates
2016-12-03 09:24:28
  • Multiple Updates
2016-11-29 00:25:35
  • Multiple Updates
2016-10-18 21:25:43
  • Multiple Updates
2016-10-18 12:04:46
  • Multiple Updates
2016-03-08 13:26:07
  • Multiple Updates
2016-01-15 13:26:53
  • Multiple Updates
2015-11-16 21:26:44
  • Multiple Updates
2015-11-15 09:23:22
  • First insertion