{"id":"CVE-2016-5352","details":"epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","modified":"2026-04-16T06:19:34.013546982Z","published":"2016-08-07T16:59:04.657Z","related":["SUSE-SU-2016:2212-1","SUSE-SU-2016:2453-1","openSUSE-SU-2024:10199-1"],"references":[{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91140"},{"type":"ADVISORY","url":"https://www.wireshark.org/security/wnpa-sec-2016-31.html"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12175"},{"type":"FIX","url":"https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/09/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"0"},{"last_affected":"9a73b827b22c7ce9132e939b9f07ec4425fc2aa6"},{"introduced":"0"},{"last_affected":"59ea380c69dca2bc2f97fa97c1bf410bbcd2411c"},{"introduced":"0"},{"last_affected":"a16e22ed9cbbc599fe8b7b8e40a6696a0138c489"},{"introduced":"0"},{"last_affected":"eed34f0ac6696c053585ddf75c5805b3d5b395cf"},{"fixed":"b6d838eebf4456192360654092e5587c5207f185"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.0"},{"introduced":"0"},{"last_affected":"2.0.1"},{"introduced":"0"},{"last_affected":"2.0.2"},{"introduced":"0"},{"last_affected":"2.0.3"}]}}],"versions":["backups/ethereal@18706","ethereal-0-3-15","ethereal-0.3.15","start","v1.11.0","v1.11.0-rc1","v1.11.1","v1.11.1-rc1","v1.11.2","v1.11.2-rc1","v1.11.3","v1.11.3-rc1","v1.11.4-rc1","v1.99.0","v1.99.0-rc1","v1.99.1","v1.99.10rc0","v1.99.1rc0","v1.99.2","v1.99.2rc0","v1.99.3","v1.99.3rc0","v1.99.4","v1.99.4rc0","v1.99.5","v1.99.5rc0","v1.99.6","v1.99.6rc0","v1.99.7","v1.99.7rc0","v1.99.8","v1.99.8rc0","v1.99.9","v1.99.9rc0","v2.0.0","v2.0.0rc0","v2.0.0rc1","v2.0.0rc2","v2.0.0rc3","v2.0.1","v2.0.1rc0","v2.0.2","v2.0.2rc0","v2.0.3","v2.0.3rc0","v2.1.0rc0","wireshark-1.11.3","wireshark-1.99.0","wireshark-1.99.1","wireshark-1.99.2","wireshark-1.99.3","wireshark-1.99.4","wireshark-1.99.5","wireshark-1.99.6","wireshark-1.99.7","wireshark-1.99.8","wireshark-1.99.9","wireshark-2.0.0","wireshark-2.0.1","wireshark-2.0.2","wireshark-2.0.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5352.json","vanir_signatures":[{"source":"https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185","signature_version":"v1","digest":{"function_hash":"204436606585103488598984017702699428360","length":2816},"deprecated":false,"signature_type":"Function","id":"CVE-2016-5352-034c51ec","target":{"function":"AirPDcapDecryptWPABroadcastKey","file":"epan/crypt/airpdcap.c"}},{"source":"https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185","signature_version":"v1","target":{"file":"epan/crypt/airpdcap.c"},"id":"CVE-2016-5352-528cb006","signature_type":"Line","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["269556554773346192026943288233541617750","77509773460296953082704123668467698241","72504310042474087492335136225954665592","230551356104076631495515828557984780858"]}}],"vanir_signatures_modified":"2026-04-11T04:02:17Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}