Debian update for wireshark



| Updated: 2017-12-12
Risk Low
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2017-11408
CVE-2017-13766
CVE-2017-17083
CVE-2017-17084
CVE-2017-17085
CWE-ID CWE-20
CWE-787
Exploitation vector Network
Public exploit N/A
Vulnerable software
Debian Linux
Operating systems & Components / Operating system

Vendor Debian

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Improper input validation

EUVDB-ID: #VU9650

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-11408

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in the AMQP dissector in epan/dissectors/packet-amqp.c when processing network packets. A remote attacker can send a specially crafted packet and crash the vulnerable application.

Mitigation

Update the affected package to version: 1.12.1+g01b65bf-4+deb8u12, 2.2.6+g32dac6a-2+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2017/dsa-4060


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds write

EUVDB-ID: #VU8073

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-13766

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds write in the Profinet I/O dissector. A remote attacker can inject a malformed packet onto the wire, trigger Wireshark to consume excessive CPU resources and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected package to version: 1.12.1+g01b65bf-4+deb8u12, 2.2.6+g32dac6a-2+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2017/dsa-4060


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper input validation

EUVDB-ID: #VU9611

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-17083

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in the NetBIOS dissector in epan/dissectors/packet-netbios.c when processing network packets. A remote attacker can send a specially crafted packet and crash the vulnerable application.

Mitigation

Update the affected package to version: 1.12.1+g01b65bf-4+deb8u12, 2.2.6+g32dac6a-2+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2017/dsa-4060


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper input validation

EUVDB-ID: #VU9612

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-17084

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in the IWARP_MPA dissector in epan/dissectors/packet-iwarp-mpa.c when processing network packets. A remote attacker can send a specially crafted packet and crash the vulnerable application.

Mitigation

Update the affected package to version: 1.12.1+g01b65bf-4+deb8u12, 2.2.6+g32dac6a-2+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2017/dsa-4060


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper input validation

EUVDB-ID: #VU9613

Risk: Low

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-17085

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in the CIP Safety dissector in epan/dissectors/packet-cipsafety.c when processing network packets. A remote attacker can send a specially crafted packet and crash the vulnerable application.

Mitigation

Update the affected package to version: 1.12.1+g01b65bf-4+deb8u12, 2.2.6+g32dac6a-2+deb9u1

Vulnerable software versions

Debian Linux: All versions

CPE2.3 External links

https://www.debian.org/security/2017/dsa-4060


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###