{"id":"CVE-2016-5351","details":"epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","modified":"2026-02-24T01:10:13.326341Z","published":"2016-08-07T16:59:03.157Z","related":["MGASA-2016-0223","SUSE-SU-2016:2212-1","SUSE-SU-2016:2453-1","openSUSE-SU-2024:10199-1"],"references":[{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91140"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3615"},{"type":"ADVISORY","url":"https://www.wireshark.org/security/wnpa-sec-2016-30.html"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585"},{"type":"FIX","url":"https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/09/3"},{"type":"EVIDENCE","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"0"},{"fixed":"9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4"}]}],"versions":["backups/ethereal@18706","ethereal-0-3-15","ethereal-0.3.15","start","v1.11.0","v1.11.0-rc1","v1.11.1","v1.11.1-rc1","v1.11.2","v1.11.2-rc1","v1.11.3","v1.11.3-rc1","v1.11.4-rc1","v1.99.0","v1.99.0-rc1","v1.99.1","v1.99.10rc0","v1.99.1rc0","v1.99.2","v1.99.2rc0","v1.99.3","v1.99.3rc0","v1.99.4","v1.99.4rc0","v1.99.5","v1.99.5rc0","v1.99.6","v1.99.6rc0","v1.99.7","v1.99.7rc0","v1.99.8","v1.99.8rc0","v1.99.9","v1.99.9rc0","v2.1.0rc0","wireshark-1.11.3","wireshark-1.99.0","wireshark-1.99.1","wireshark-1.99.2","wireshark-1.99.3","wireshark-1.99.4","wireshark-1.99.5","wireshark-1.99.6","wireshark-1.99.7","wireshark-1.99.8","wireshark-1.99.9"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","source":"https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4","digest":{"function_hash":"296458949931481913643121311399429596712","length":5456},"target":{"function":"AirPDcapScanForKeys","file":"epan/crypt/airpdcap.c"},"id":"CVE-2016-5351-68d79495","signature_type":"Function","deprecated":false},{"signature_version":"v1","source":"https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4","digest":{"threshold":0.9,"line_hashes":["37652374563865177743326216940319484184","222147689584816300059826757404927774604","110738509525779230859447090536084539198","63065127473966425569594560141077604875"]},"target":{"file":"epan/crypt/airpdcap.c"},"id":"CVE-2016-5351-a69fb01c","signature_type":"Line","deprecated":false}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5351.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}