CVE-2016-6504

Source
https://cve.org/CVERecord?id=CVE-2016-6504
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6504.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-6504
Downstream
Related
Published
2016-08-06T23:59:01.477Z
Modified
2026-03-15T22:10:33.795824Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1.12.x before 1.12.13 does not properly maintain a ptvc data structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.

References

Affected packages

Git / github.com/wireshark/wireshark

Affected ranges

Type
GIT
Repo
https://github.com/wireshark/wireshark
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.0"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.2"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.3"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.4"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.5"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.6"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.7"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.8"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.9"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.10"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.11"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.12.12"
        }
    ]
}

Affected versions

Other
backups/ethereal@18706
ethereal-0-3-15
start
ethereal-0.*
ethereal-0.3.15
v1.*
v1.11.0
v1.11.0-rc1
v1.11.1
v1.11.1-rc1
v1.11.2
v1.11.2-rc1
v1.11.3
v1.11.3-rc1
v1.11.4-rc1
v1.12.0
v1.12.0-rc1
v1.12.0-rc2
v1.12.0rc3
wireshark-1.*
wireshark-1.11.3
wireshark-1.12.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6504.json"