Denial of service in Wireshark

Published: 2017-11-03 13:25:12
Severity Low
Patch available YES
Number of vulnerabilities 5
CVSSv2 3.2 (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.2 (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.2 (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.2 (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.2 (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
CVSSv3 3.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
3.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
3.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
3.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
3.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE ID CVE-2017-15192
CVE-2017-15193
CVE-2017-15191
CVE-2017-15189
CVE-2017-15190
CWE ID CWE-20
Exploitation vector Network
Public exploit Not available
Vulnerable software Wireshark
Vulnerable software versions Wireshark 2.2.9
Wireshark 2.2.8
Wireshark 2.2.7
Show more
Vendor URL Wireshark.org
Advisory type Public

Security Advisory

1) Improper input validation

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file and cause the Bluetooth Attribute Protocol dissector to crash.

Remediation

Update to version 2.4.2, 2.2.10 or later.

External links

https://www.wireshark.org/security/wnpa-sec-2017-42.html

2) Improper input validation

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file and cause the MBIM dissector to crash.

Remediation

Update to version 2.4.2, 2.2.10 or later.

External links

https://www.wireshark.org/security/wnpa-sec-2017-43.html

3) Improper input validation

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file and cause the DMP dissector to crash.

Remediation

Update to version 2.0.16, 2.4.2, 2.2.10 or later.

External links

https://www.wireshark.org/security/wnpa-sec-2017-44.html

4) Improper input validation

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to an infinite loop. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file, consume excessive CPU resources and cause the DOCSIS dissector to crash.

Remediation

Update to version 2.4.2 or later.

External links

https://www.wireshark.org/security/wnpa-sec-2017-46.html

5) Improper input validation

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to insufficient validation of user-supplied input. A remote attacker can inject a malformed packet onto the wire or convince the victim into reading a malformed packet trace file and cause the RTSP dissector to crash.

Remediation

Update to version 2.4.2 or later.

External links

https://www.wireshark.org/security/wnpa-sec-2017-45.html

Back to List