KLA11034
Multiple vulnerabilities in Wireshark
Updated: 06/06/2017
CVSS
?
6.3
Detect date
?
06/01/2017
Severity
?
High
Description

Multiple serious vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities possibly to cause a denial of service.

Below is a complete list of vulnerabilities:

  1. An improper handling of dividing by zero in the L2CAP dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of sevice;
  2. Multiple unspecified vulnerabilities in the MSNIP, RGMP, IPv6 dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of sevice;
  3. An unspecified vulnerability in the openSAFETY dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of sevice;
  4. An infinite loop in the DICOM dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of sevice;
  5. Infinite loops in the DNS, SoulSeek and Bazaar dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of sevice;
  6. An out-of-bounds read in the DHCP and DOF dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of sevice;
  7.  A null pointer dereference in the ROS dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of sevice;

Technical details

In case of vulnerability (3), denial of service can be a crash or a system memory exhaustion.

Denial of service, which might become a result of exploiting vulnerabilities (5), occurs because of consuming excessive CPU resources.

 

Affected products

Wireshark 2.0.x before 2.0.13
Wireshark 2.2.x before 2.2.7

Solution

Update to the latest version
Download Wiresrk

Original advisories

wnpa-sec-2017-31
wnpa-sec-2017-33
wnpa-sec-2017-26
wnpa-sec-2017-27
wnpa-sec-2017-28
wnpa-sec-2017-29
wnpa-sec-2017-30
wnpa-sec-2017-24
wnpa-sec-2017-32
wnpa-sec-2017-22
wnpa-sec-2017-23
wnpa-sec-2017-25

Impacts
?
DoS 
[?]
Related products
Wireshark
CVE-IDS
?

CVE-2017-9354
CVE-2017-9353
CVE-2017-9352
CVE-2017-9351
CVE-2017-9350
CVE-2017-9349
CVE-2017-9347
CVE-2017-9346
CVE-2017-9345
CVE-2017-9344
CVE-2017-9343