Searching
..

Click anywhere to stop

KLA11034
Multiple vulnerabilities in Wireshark

Updated: 01/22/2024
Detect date
?
06/02/2017
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities possibly to cause a denial of service.

Below is a complete list of vulnerabilities:

  1. An improper handling of dividing by zero in the L2CAP dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  2. Multiple unspecified vulnerabilities in the MSNIP, RGMP, IPv6 dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  3. An unspecified vulnerability in the openSAFETY dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  4. An infinite loop in the DICOM dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  5. Infinite loops in the DNS, SoulSeek and Bazaar dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  6. An out-of-bounds read in the DHCP and DOF dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  7. A null pointer dereference in the ROS dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;

Technical details

In case of vulnerability (3), denial of service can be a crash or a system memory exhaustion.

Denial of service, which might become a result of exploiting vulnerabilities (5), occurs because of consuming excessive CPU resources.

Affected products

Wireshark 2.0.x before 2.0.13
Wireshark 2.2.x before 2.2.7

Solution

Update to the latest version
Download Wireshark

Original advisories

wnpa-sec-2017-31
wnpa-sec-2017-33
wnpa-sec-2017-26
wnpa-sec-2017-27
wnpa-sec-2017-28
wnpa-sec-2017-29
wnpa-sec-2017-30
wnpa-sec-2017-24
wnpa-sec-2017-32
wnpa-sec-2017-22
wnpa-sec-2017-23
wnpa-sec-2017-25

Impacts
?
DoS 
[?]
Related products
Wireshark
CVE-IDS
?
CVE-2017-93435.0Warning
CVE-2017-93445.0Warning
CVE-2017-93457.8Critical
CVE-2017-93467.8Critical
CVE-2017-93475.0Warning
CVE-2017-93497.8Critical
CVE-2017-93507.8Critical
CVE-2017-93515.0Warning
CVE-2017-93527.8Critical
CVE-2017-93535.0Warning
CVE-2017-93545.0Warning
Exploitation

Public exploits exist for this vulnerability.

Find out the statistics of the vulnerabilities spreading in your region