Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-9373


In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings.


Published

2016-11-17T05:59:01.757

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application wireshark wireshark 2.0.0 Yes
Application wireshark wireshark 2.0.1 Yes
Application wireshark wireshark 2.0.2 Yes
Application wireshark wireshark 2.0.3 Yes
Application wireshark wireshark 2.0.4 Yes
Application wireshark wireshark 2.0.5 Yes
Application wireshark wireshark 2.0.6 Yes
Application wireshark wireshark 2.0.7 Yes
Application wireshark wireshark 2.2.0 Yes
Application wireshark wireshark 2.2.1 Yes
Operating System debian debian_linux 8.0 Yes

References