VYPR
Unrated severityNVD Advisory· Published Mar 8, 2015· Updated May 6, 2026

CVE-2015-2187

CVE-2015-2187

Description

The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.

Affected products

6
  • OpenSUSE/openSUSE2 versions
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*
    • cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*
    • cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*
    • cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.