Kaspersky ID:
KLA11377
Fecha de detección:
11/27/2018
Actualizado:
01/28/2026

Descripción

Multiple serious vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A heap buffer over-read vulnerability in the Wireshark dissection engine can be exploited remotely via malformed packet to cause denial of service;
  2. An improper null termination vulnerability in the DCOM dissector can be exploited remotely via malformed packet to cause denial of service;
  3. An improper input validation vulnerability in the LBMPDM dissector can be exploited remotely via malformed packet to cause denial of service and bypass security restrictions;
  4. An infinite loop vulnerability in the MMSE dissector can be exploited remotely via malformed packet to cause denial of service;
  5. A heap buffer overflow vulnerability in the IxVeriWave file parser can be exploited remotely via malformed packet to cause denial of service;
  6. A NULL pointer dereference vulnerability in the PVFS dissector can be exploited remotely via malformed packet to cause denial of service;
  7. A division by zero vulnerability in the ZigBee ZCL dissector can be exploited remotely via malformed packet to cause denial of service;

Notas informativas originales

Explotación

Public exploits exist for this vulnerability.

Productos relacionados

Lista CVE

  • CVE-2018-19625
    high
  • CVE-2018-19626
    high
  • CVE-2018-19623
    critical
  • CVE-2018-19622
    critical
  • CVE-2018-19627
    critical
  • CVE-2018-19624
    high
  • CVE-2018-19628
    critical

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.