{"id":"UBUNTU-CVE-2016-4006","details":"epan/proto.c in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not limit the protocol-tree depth, which allows remote attackers to cause a denial of service (stack memory consumption and application crash) via a crafted packet.","modified":"2026-04-22T10:42:08.989884Z","published":"2016-04-25T10:59:00Z","upstream":["CVE-2016-4006"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4006"},{"type":"REPORT","url":"https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8dc9551e1d56290e6f7f02cc38b77e1d211fd4a5"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12268"},{"type":"REPORT","url":"http://www.wireshark.org/security/wnpa-sec-2016-25.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-4006"}],"affected":[{"package":{"name":"wireshark","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/wireshark@1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"}]}],"versions":["1.10.2-1","1.10.3-1","1.10.5-1ubuntu1","1.10.5-2","1.10.6-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libwireshark-data","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwireshark5","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwiretap4","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwsutil4","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"tshark","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"wireshark","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"wireshark-common","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"wireshark-qt","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4006.json"}},{"package":{"name":"wireshark","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/wireshark@2.2.6+g32dac6a-2ubuntu0.16.04?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.6+g32dac6a-2ubuntu0.16.04"}]}],"versions":["1.12.7+g7fc8978-1","1.12.8+g5b6e543-2","2.0.1+g59ea380-3build1","2.0.2+ga16e22e-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libwireshark-data","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwireshark8","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwiretap6","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwscodecs1","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwsutil7","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"tshark","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark-common","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark-gtk","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark-qt","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4006.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}