The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://github.com/ARPSyndicate/cvemon
- https://github.com/brianhigh/us-cert-bulletins