epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
{ "vanir_signatures": [ { "deprecated": false, "id": "CVE-2016-5358-01635744", "signature_version": "v1", "digest": { "line_hashes": [ "334449315304977340383420241633226719348", "320932733435266253742538915120566453735", "245578774751302863541828047293755008713", "30357838436267856021800050734870027683", "138813970532645865194505331319396360567", "307805584734905139821814819274303399748", "315719582076679645125194644249402846205", "209976510120667078380335317260493077732", "146747277072124464506533847220692900739" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "epan/dissectors/packet-ppi.c" }, "source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7" }, { "deprecated": false, "id": "CVE-2016-5358-21f495bd", "signature_version": "v1", "digest": { "length": 6352.0, "function_hash": "299449988594139569541305770469884692042" }, "signature_type": "Function", "target": { "function": "dissect_ppi", "file": "epan/dissectors/packet-ppi.c" }, "source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7" }, { "deprecated": false, "id": "CVE-2016-5358-5ce2fd91", "signature_version": "v1", "digest": { "length": 2107.0, "function_hash": "338752519889218304733566749802042023821" }, "signature_type": "Function", "target": { "function": "dissect_pktap", "file": "epan/dissectors/packet-pktap.c" }, "source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7" }, { "deprecated": false, "id": "CVE-2016-5358-637a8fc0", "signature_version": "v1", "digest": { "length": 1564.0, "function_hash": "330430542262926018448608795824361140614" }, "signature_type": "Function", "target": { "function": "dissect_rpcap_packet", "file": "epan/dissectors/packet-rpcap.c" }, "source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7" }, { "deprecated": false, "id": "CVE-2016-5358-649fa91b", "signature_version": "v1", "digest": { "line_hashes": [ "27916644768496533656810545275833789355", "37823342120425800220646364435165916704", "264994017350731906222936056776478734300", "132396777522632413076630297376118682332", "289632527312961041599743416980106338989", "134593429129036244985834589675552433877", "115801305615867899831225278823859525566", "209976510120667078380335317260493077732", "70616474456708318787207731558451418760" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "epan/dissectors/packet-pktap.c" }, "source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7" }, { "deprecated": false, "id": "CVE-2016-5358-d1613c7c", "signature_version": "v1", "digest": { "line_hashes": [ "216969062309645181064252099101574065597", "144417925569203975010017039560378111186", "279709717053073643829043742089946626936", "45601298362245210734312012769402793251", "170802040358257705377537301921365358538", "138838526760500685021898488601579542890", "109083495737063408071250071069583155465", "225064910552521824428069315849786949102" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "epan/dissectors/packet-rpcap.c" }, "source": "https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7" } ] }