{"id":"UBUNTU-CVE-2016-4080","details":"epan/dissectors/packet-pktc.c in the PKTC dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 misparses timestamp fields, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.","modified":"2025-09-08T16:43:43Z","published":"2016-04-25T10:59:00Z","upstream":["CVE-2016-4080"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4080"},{"type":"REPORT","url":"https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=ad097385c05c370440fb810e67f811398efc0ea0"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12242"},{"type":"REPORT","url":"http://www.wireshark.org/security/wnpa-sec-2016-23.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-4080"}],"affected":[{"package":{"name":"wireshark","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/wireshark@1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"}]}],"versions":["1.10.2-1","1.10.3-1","1.10.5-1ubuntu1","1.10.5-2","1.10.6-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libwireshark-data","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwireshark-dev","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwireshark5","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwiretap-dev","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwiretap4","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwsutil-dev","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"libwsutil4","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"tshark","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"wireshark","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"wireshark-common","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"wireshark-dev","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"},{"binary_name":"wireshark-qt","binary_version":"1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4080.json"}},{"package":{"name":"wireshark","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/wireshark@2.2.6+g32dac6a-2ubuntu0.16.04?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.6+g32dac6a-2ubuntu0.16.04"}]}],"versions":["1.12.7+g7fc8978-1","1.12.8+g5b6e543-2","2.0.1+g59ea380-3build1","2.0.2+ga16e22e-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libwireshark-data","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwireshark-dev","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwireshark8","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwiretap-dev","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwiretap6","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwscodecs1","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwsutil-dev","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"libwsutil7","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"tshark","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark-common","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark-dev","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark-gtk","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"},{"binary_name":"wireshark-qt","binary_version":"2.2.6+g32dac6a-2ubuntu0.16.04"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4080.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}