Description
Multiple serious vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities possibly to cause a denial of service.
Below is a complete list of vulnerabilities:
- An improper handling of dividing by zero in the L2CAP dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- Multiple unspecified vulnerabilities in the MSNIP, RGMP, IPv6 dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- An unspecified vulnerability in the openSAFETY dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- An infinite loop in the DICOM dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- Infinite loops in the DNS, SoulSeek and Bazaar dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- An out-of-bounds read in the DHCP and DOF dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- A null pointer dereference in the ROS dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
Technical details
In case of vulnerability (3), denial of service can be a crash or a system memory exhaustion.
Denial of service, which might become a result of exploiting vulnerabilities (5), occurs because of consuming excessive CPU resources.
Original advisories
- wnpa-sec-2017-33
- wnpa-sec-2017-26
- wnpa-sec-2017-27
- wnpa-sec-2017-28
- wnpa-sec-2017-29
- wnpa-sec-2017-30
- wnpa-sec-2017-24
- wnpa-sec-2017-32
- wnpa-sec-2017-22
- wnpa-sec-2017-23
- wnpa-sec-2017-25
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2017-9343 warning
- CVE-2017-9344 warning
- CVE-2017-9345 critical
- CVE-2017-9346 critical
- CVE-2017-9347 warning
- CVE-2017-9349 critical
- CVE-2017-9350 critical
- CVE-2017-9351 warning
- CVE-2017-9352 critical
- CVE-2017-9353 warning
- CVE-2017-9354 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!