Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libwiretap-dev-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwsutil-dev-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-dev": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-dev-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-dbg": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-doc": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwsutil4": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwireshark5-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwiretap-dev": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwsutil-dev": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "tshark": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwireshark-dev": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "tshark-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-common-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-qt": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwireshark-dev-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-common": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwsutil4-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwiretap4-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwireshark-data": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwireshark5": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "libwiretap4": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1", "wireshark-qt-dbgsym": "1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libwireshark6-dbgsym": "2.0.2+ga16e22e-1", "wireshark-dev": "2.0.2+ga16e22e-1", "libwiretap5-dbgsym": "2.0.2+ga16e22e-1", "wireshark-doc": "2.0.2+ga16e22e-1", "libwiretap5": "2.0.2+ga16e22e-1", "wireshark-common-dbgsym": "2.0.2+ga16e22e-1", "wireshark-gtk-dbgsym": "2.0.2+ga16e22e-1", "tshark-dbgsym": "2.0.2+ga16e22e-1", "libwsutil-dev": "2.0.2+ga16e22e-1", "libwiretap-dev": "2.0.2+ga16e22e-1", "libwireshark-dev": "2.0.2+ga16e22e-1", "tshark": "2.0.2+ga16e22e-1", "wireshark-qt": "2.0.2+ga16e22e-1", "libwireshark6": "2.0.2+ga16e22e-1", "libwsutil6": "2.0.2+ga16e22e-1", "wireshark": "2.0.2+ga16e22e-1", "wireshark-common": "2.0.2+ga16e22e-1", "libwireshark-data": "2.0.2+ga16e22e-1", "wireshark-gtk": "2.0.2+ga16e22e-1", "wireshark-qt-dbgsym": "2.0.2+ga16e22e-1", "libwsutil6-dbgsym": "2.0.2+ga16e22e-1" } ] }