epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"334449315304977340383420241633226719348",
"320932733435266253742538915120566453735",
"245578774751302863541828047293755008713",
"30357838436267856021800050734870027683",
"138813970532645865194505331319396360567",
"307805584734905139821814819274303399748",
"315719582076679645125194644249402846205",
"209976510120667078380335317260493077732",
"146747277072124464506533847220692900739"
]
},
"deprecated": false,
"id": "CVE-2016-5358-01635744",
"source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7",
"target": {
"file": "epan/dissectors/packet-ppi.c"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "299449988594139569541305770469884692042",
"length": 6352.0
},
"deprecated": false,
"id": "CVE-2016-5358-21f495bd",
"source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7",
"target": {
"function": "dissect_ppi",
"file": "epan/dissectors/packet-ppi.c"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "338752519889218304733566749802042023821",
"length": 2107.0
},
"deprecated": false,
"id": "CVE-2016-5358-5ce2fd91",
"source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7",
"target": {
"function": "dissect_pktap",
"file": "epan/dissectors/packet-pktap.c"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "330430542262926018448608795824361140614",
"length": 1564.0
},
"deprecated": false,
"id": "CVE-2016-5358-637a8fc0",
"source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7",
"target": {
"function": "dissect_rpcap_packet",
"file": "epan/dissectors/packet-rpcap.c"
},
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"27916644768496533656810545275833789355",
"37823342120425800220646364435165916704",
"264994017350731906222936056776478734300",
"132396777522632413076630297376118682332",
"289632527312961041599743416980106338989",
"134593429129036244985834589675552433877",
"115801305615867899831225278823859525566",
"209976510120667078380335317260493077732",
"70616474456708318787207731558451418760"
]
},
"deprecated": false,
"id": "CVE-2016-5358-649fa91b",
"source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7",
"target": {
"file": "epan/dissectors/packet-pktap.c"
},
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"216969062309645181064252099101574065597",
"144417925569203975010017039560378111186",
"279709717053073643829043742089946626936",
"45601298362245210734312012769402793251",
"170802040358257705377537301921365358538",
"138838526760500685021898488601579542890",
"109083495737063408071250071069583155465",
"225064910552521824428069315849786949102"
]
},
"deprecated": false,
"id": "CVE-2016-5358-d1613c7c",
"source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7",
"target": {
"file": "epan/dissectors/packet-rpcap.c"
},
"signature_version": "v1"
}
]