epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
{ "vanir_signatures": [ { "id": "CVE-2016-5352-034c51ec", "source": "https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 2816.0, "function_hash": "204436606585103488598984017702699428360" }, "target": { "file": "epan/crypt/airpdcap.c", "function": "AirPDcapDecryptWPABroadcastKey" } }, { "id": "CVE-2016-5352-528cb006", "source": "https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "269556554773346192026943288233541617750", "77509773460296953082704123668467698241", "72504310042474087492335136225954665592", "230551356104076631495515828557984780858" ] }, "target": { "file": "epan/crypt/airpdcap.c" } } ] }