epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOLRSNKEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.12.0"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.2"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.3"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.4"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.5"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.6"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.7"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.8"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.9"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.10"
},
{
"introduced": "0"
},
{
"last_affected": "1.12.11"
},
{
"introduced": "0"
},
{
"last_affected": "2.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.0.3"
}
]
}[
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "epan/crypt/airpdcap.c",
"function": "AirPDcapScanForKeys"
},
"id": "CVE-2016-5351-68d79495",
"deprecated": false,
"source": "https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4",
"digest": {
"function_hash": "296458949931481913643121311399429596712",
"length": 5456.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "epan/crypt/airpdcap.c"
},
"id": "CVE-2016-5351-a69fb01c",
"deprecated": false,
"source": "https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4",
"digest": {
"line_hashes": [
"37652374563865177743326216940319484184",
"222147689584816300059826757404927774604",
"110738509525779230859447090536084539198",
"63065127473966425569594560141077604875"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5351.json"