epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[
{
"source": "https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185",
"target": {
"function": "AirPDcapDecryptWPABroadcastKey",
"file": "epan/crypt/airpdcap.c"
},
"id": "CVE-2016-5352-034c51ec",
"deprecated": false,
"digest": {
"function_hash": "204436606585103488598984017702699428360",
"length": 2816.0
},
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185",
"target": {
"file": "epan/crypt/airpdcap.c"
},
"id": "CVE-2016-5352-528cb006",
"deprecated": false,
"digest": {
"line_hashes": [
"269556554773346192026943288233541617750",
"77509773460296953082704123668467698241",
"72504310042474087492335136225954665592",
"230551356104076631495515828557984780858"
],
"threshold": 0.9
},
"signature_version": "v1",
"signature_type": "Line"
}
]