epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOLRSNKEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
{ "vanir_signatures": [ { "signature_version": "v1", "source": "https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4", "deprecated": false, "id": "CVE-2016-5351-68d79495", "signature_type": "Function", "digest": { "length": 5456.0, "function_hash": "296458949931481913643121311399429596712" }, "target": { "file": "epan/crypt/airpdcap.c", "function": "AirPDcapScanForKeys" } }, { "signature_version": "v1", "source": "https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4", "deprecated": false, "id": "CVE-2016-5351-a69fb01c", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "37652374563865177743326216940319484184", "222147689584816300059826757404927774604", "110738509525779230859447090536084539198", "63065127473966425569594560141077604875" ] }, "target": { "file": "epan/crypt/airpdcap.c" } } ] }