{ "schema_version": "1.4.0", "id": "GHSA-c3r9-8878-x2vq", "modified": "2025-04-12T13:06:33Z", "published": "2022-05-17T02:24:18Z", "aliases": [ "CVE-2016-9376" ], "details": "In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9376" }, { "type": "WEB", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13071" }, { "type": "WEB", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f2a7af8d3928e18ef15778e63b9b6c78f8bd1bef" }, { "type": "WEB", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f2a7af8d3928e18ef15778e63b9b6c78f8bd1bef" }, { "type": "WEB", "url": "https://www.wireshark.org/security/wnpa-sec-2016-60.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3719" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/94369" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037313" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-11-17T05:59:00Z" } }