Kaspersky ID:
KLA11377
Detect Date:
11/27/2018
Updated:
01/28/2026

Description

Multiple serious vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A heap buffer over-read vulnerability in the Wireshark dissection engine can be exploited remotely via malformed packet to cause denial of service;
  2. An improper null termination vulnerability in the DCOM dissector can be exploited remotely via malformed packet to cause denial of service;
  3. An improper input validation vulnerability in the LBMPDM dissector can be exploited remotely via malformed packet to cause denial of service and bypass security restrictions;
  4. An infinite loop vulnerability in the MMSE dissector can be exploited remotely via malformed packet to cause denial of service;
  5. A heap buffer overflow vulnerability in the IxVeriWave file parser can be exploited remotely via malformed packet to cause denial of service;
  6. A NULL pointer dereference vulnerability in the PVFS dissector can be exploited remotely via malformed packet to cause denial of service;
  7. A division by zero vulnerability in the ZigBee ZCL dissector can be exploited remotely via malformed packet to cause denial of service;

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2018-19625
    high
  • CVE-2018-19626
    high
  • CVE-2018-19623
    critical
  • CVE-2018-19622
    critical
  • CVE-2018-19627
    critical
  • CVE-2018-19624
    high
  • CVE-2018-19628
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Do you want to save your changes?
Your message has been sent successfully.