Wireshark is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets.
Attackers can exploit this issue to crash the affected application, resulting in denial-of-service conditions.
Wireshark 2.2.0 is vulnerable.
Information
Exploit
A sample packet trace file is available in the Wireshark bug report. Please see the references for more information.
References:
- BTL2AP: compare strings with strcmp, not memcp (Wireshark)
- Buildbot crash output: fuzz-2016-09-04-21710.pcap (Wireshark)
- Wireshark Homepage (Wireshark)
- wnpa-sec-2016-56 · Bluetooth L2CAP dissector crash (Wireshark)