epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libwireshark-dev": "1.10.6-1", "libwireshark3": "1.10.6-1", "libwiretap3": "1.10.6-1", "wireshark-dev": "1.10.6-1", "wireshark": "1.10.6-1", "wireshark-common": "1.10.6-1", "wireshark-dbg": "1.10.6-1", "wireshark-doc": "1.10.6-1", "libwireshark-data": "1.10.6-1", "libwsutil3": "1.10.6-1", "tshark": "1.10.6-1", "libwiretap-dev": "1.10.6-1", "libwsutil-dev": "1.10.6-1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libwscodecs1-dbgsym": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark-dev": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwireshark8-dbgsym": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark-doc": "2.2.6+g32dac6a-2ubuntu0.16.04", "tshark": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwscodecs1": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwiretap-dev": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwsutil-dev": "2.2.6+g32dac6a-2ubuntu0.16.04", "tshark-dbgsym": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwireshark-dev": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwsutil7": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwsutil7-dbgsym": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark-qt": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwiretap6-dbgsym": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark-common": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark-common-dbgsym": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark-gtk-dbgsym": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwireshark-data": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwiretap6": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark-gtk": "2.2.6+g32dac6a-2ubuntu0.16.04", "wireshark-qt-dbgsym": "2.2.6+g32dac6a-2ubuntu0.16.04", "libwireshark8": "2.2.6+g32dac6a-2ubuntu0.16.04" } ] }