SB2017101231 - Fedora 27 update for wireshark
Published: October 12, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2017-15189)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to an infinite loop. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file, consume excessive CPU resources and cause the DOCSIS dissector to crash.
2) Improper input validation (CVE-ID: CVE-2017-15190)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file and cause the RTSP dissector to crash.
3) Improper input validation (CVE-ID: CVE-2017-15191)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file and cause the DMP dissector to crash.
4) Improper input validation (CVE-ID: CVE-2017-15192)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file and cause the Bluetooth Attribute Protocol dissector to crash.
5) Improper input validation (CVE-ID: CVE-2017-15193)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to insufficient validation of user-supplied input. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file and cause the MBIM dissector to crash.
6) Null pointer dereference (CVE-ID: CVE-2017-13764)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to NULL pointer dereference in the Modbus dissector. A remote attacker can inject a malformed packet onto the wire, trigger Wireshark to consume excessive CPU resources and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
7) Buffer over-read (CVE-ID: CVE-2017-13765)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to buffer over-read in the IrCOMM dissector. A remote attacker can inject a malformed packet onto the wire, trigger Wireshark to consume excessive CPU resources and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
8) Out-of-bounds write (CVE-ID: CVE-2017-13766)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to out-of-bounds write in the Profinet I/O dissector. A remote attacker can inject a malformed packet onto the wire, trigger Wireshark to consume excessive CPU resources and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
9) Infinite loop (CVE-ID: CVE-2017-13767)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to infinite loop in the MSDP dissector. A remote attacker can inject a malformed packet onto the wire, trigger Wireshark to consume excessive CPU resources and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.