{"id":"CVE-2016-5358","details":"epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","modified":"2026-02-24T01:10:09.587999Z","published":"2016-08-07T16:59:13.270Z","related":["MGASA-2016-0223","SUSE-SU-2016:2212-1","SUSE-SU-2016:2453-1","openSUSE-SU-2024:10199-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/91140"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"ADVISORY","url":"https://www.wireshark.org/security/wnpa-sec-2016-37.html"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12440"},{"type":"FIX","url":"https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/09/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"0"},{"fixed":"2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7"}]}],"versions":["backups/ethereal@18706","ethereal-0-3-15","ethereal-0.3.15","start","v1.11.0","v1.11.0-rc1","v1.11.1","v1.11.1-rc1","v1.11.2","v1.11.2-rc1","v1.11.3","v1.11.3-rc1","v1.11.4-rc1","v1.99.0","v1.99.0-rc1","v1.99.1","v1.99.10rc0","v1.99.1rc0","v1.99.2","v1.99.2rc0","v1.99.3","v1.99.3rc0","v1.99.4","v1.99.4rc0","v1.99.5","v1.99.5rc0","v1.99.6","v1.99.6rc0","v1.99.7","v1.99.7rc0","v1.99.8","v1.99.8rc0","v1.99.9","v1.99.9rc0","v2.0.0","v2.0.0rc0","v2.0.0rc1","v2.0.0rc2","v2.0.0rc3","v2.0.1","v2.0.1rc0","v2.0.2","v2.0.2rc0","v2.0.3","v2.0.3rc0","v2.0.4rc0","wireshark-1.11.3","wireshark-1.99.0","wireshark-1.99.1","wireshark-1.99.2","wireshark-1.99.3","wireshark-1.99.4","wireshark-1.99.5","wireshark-1.99.6","wireshark-1.99.7","wireshark-1.99.8","wireshark-1.99.9","wireshark-2.0.0","wireshark-2.0.1","wireshark-2.0.2","wireshark-2.0.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5358.json","vanir_signatures":[{"deprecated":false,"target":{"file":"epan/dissectors/packet-ppi.c"},"source":"https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7","digest":{"line_hashes":["334449315304977340383420241633226719348","320932733435266253742538915120566453735","245578774751302863541828047293755008713","30357838436267856021800050734870027683","138813970532645865194505331319396360567","307805584734905139821814819274303399748","315719582076679645125194644249402846205","209976510120667078380335317260493077732","146747277072124464506533847220692900739"],"threshold":0.9},"signature_type":"Line","signature_version":"v1","id":"CVE-2016-5358-01635744"},{"deprecated":false,"target":{"file":"epan/dissectors/packet-ppi.c","function":"dissect_ppi"},"source":"https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7","digest":{"length":6352,"function_hash":"299449988594139569541305770469884692042"},"signature_type":"Function","signature_version":"v1","id":"CVE-2016-5358-21f495bd"},{"deprecated":false,"target":{"file":"epan/dissectors/packet-pktap.c","function":"dissect_pktap"},"source":"https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7","digest":{"length":2107,"function_hash":"338752519889218304733566749802042023821"},"signature_type":"Function","signature_version":"v1","id":"CVE-2016-5358-5ce2fd91"},{"deprecated":false,"target":{"file":"epan/dissectors/packet-rpcap.c","function":"dissect_rpcap_packet"},"source":"https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7","digest":{"length":1564,"function_hash":"330430542262926018448608795824361140614"},"signature_type":"Function","signature_version":"v1","id":"CVE-2016-5358-637a8fc0"},{"deprecated":false,"target":{"file":"epan/dissectors/packet-pktap.c"},"source":"https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7","digest":{"line_hashes":["27916644768496533656810545275833789355","37823342120425800220646364435165916704","264994017350731906222936056776478734300","132396777522632413076630297376118682332","289632527312961041599743416980106338989","134593429129036244985834589675552433877","115801305615867899831225278823859525566","209976510120667078380335317260493077732","70616474456708318787207731558451418760"],"threshold":0.9},"signature_type":"Line","signature_version":"v1","id":"CVE-2016-5358-649fa91b"},{"deprecated":false,"target":{"file":"epan/dissectors/packet-rpcap.c"},"source":"https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7","digest":{"line_hashes":["216969062309645181064252099101574065597","144417925569203975010017039560378111186","279709717053073643829043742089946626936","45601298362245210734312012769402793251","170802040358257705377537301921365358538","138838526760500685021898488601579542890","109083495737063408071250071069583155465","225064910552521824428069315849786949102"],"threshold":0.9},"signature_type":"Line","signature_version":"v1","id":"CVE-2016-5358-d1613c7c"}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}