In Wireshark 2.2.0, the Bluetooth L2CAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-btl2cap.c by avoiding use of a seven-byte memcmp for potentially shorter strings.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=355b56b1c6c545072ac0c1225730b526c6749f0a | |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12825 | issue tracking patch |
http://www.securityfocus.com/bid/97597 | vdb entry third party advisory |
https://www.wireshark.org/security/wnpa-sec-2016-56.html | vendor advisory |