cpe:/a:wireshark:wireshark:1.12.0 cpe:/a:wireshark:wireshark:1.12.1 cpe:/a:wireshark:wireshark:1.12.2 cpe:/a:wireshark:wireshark:1.12.3 cpe:/a:wireshark:wireshark:1.12.4 cpe:/a:wireshark:wireshark:1.12.5 cpe:/a:wireshark:wireshark:1.12.6 cpe:/o:oracle:linux:7.0 cpe:/o:oracle:solaris:11.3 CVE-2015-6245 2015-08-24T19:59:05.397-04:00 2016-12-23T21:59:32.167-05:00 4.3 NETWORK MEDIUM NONE NONE NONE PARTIAL http://nvd.nist.gov 2016-10-18T11:23:29.600-04:00 SECTRACK 1033272 BID 76382 DEBIAN DSA-3367 FEDORA FEDORA-2015-13945 FEDORA FEDORA-2015-13946 CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html CONFIRM http://www.wireshark.org/security/wnpa-sec-2015-25.html CONFIRM https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358 CONFIRM https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=78bc3dd93a562ca1b1c5dbc8f71d2967008be7ed SUSE openSUSE-SU-2015:1836 epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.