Beschreibung
Multiple serious vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities to cause a denial of service.
Below is a complete list of vulnerabilities:
- An unspecified vulnerability in the IMAP (Internet Message Access Protocol) dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of sevice;
- An unspecified vulnerability in the WBXML (WAP Binary XML Protocol) dissector and in the BGP (Border Gateway) dissector can be exploited remotely via specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to make an infinite loop and possibly cause a denial of sevice;
- An unspecified vulnerability in the NetScaler file parser can be exploited remotely by convincing a user to handle a specially designed packet trace file to make an infinite loop and possibly cause a denial of sevice;
- An unspecified vulnerability in the RPC (Remote Procedure Call Protocols) over RDMA (Remote Direct Memory Access Protocol) dissector can be exploited remotely by convincing a user to handle a specially designed packet trace file to make an infinite loop and possibly cause a denial of sevice;
- An unspecified vulnerability in the BGP (Border Gateway) dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file possibly to cause a denial of sevice;
- Multiple unspecified vulnerabilities in the DOF dissector, in the PacketBB dissector and in the SLSK dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file possibly to cause a denial of sevice;
- Multiple unspecified vulnerabilities in the SIGCOMP (Signaling Compression) dissector and in the WSP (Wireless Session Protocol) dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file possibly to cause a denial of sevice.
Ursprüngliche Informationshinweise
- wnpa-sec-2017-18
- wnpa-sec-2017-20
- wnpa-sec-2017-21
- wnpa-sec-2017-12
- wnpa-sec-2017-17
- wnpa-sec-2017-16
- wnpa-sec-2017-19
- wnpa-sec-2017-13
- wnpa-sec-2017-15
CVE Liste
- CVE-2017-7705 critical
- CVE-2017-7704 critical
- CVE-2017-7703 critical
- CVE-2017-7702 critical
- CVE-2017-7701 critical
- CVE-2017-7700 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!