epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.Referenceshttps://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585http://www.openwall.com/lists/oss-security/2016/06/09/3https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlhttps://www.wireshark.org/security/wnpa-sec-2016-30.htmlhttp://www.debian.org/security/2016/dsa-3615http://www.securityfocus.com/bid/91140