Описание
Multiple serious vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities possibly to cause a denial of service.
Below is a complete list of vulnerabilities:
- An improper handling of dividing by zero in the L2CAP dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- Multiple unspecified vulnerabilities in the MSNIP, RGMP, IPv6 dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- An unspecified vulnerability in the openSAFETY dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- An infinite loop in the DICOM dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- Infinite loops in the DNS, SoulSeek and Bazaar dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- An out-of-bounds read in the DHCP and DOF dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
- A null pointer dereference in the ROS dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
Technical details
In case of vulnerability (3), denial of service can be a crash or a system memory exhaustion.
Denial of service, which might become a result of exploiting vulnerabilities (5), occurs because of consuming excessive CPU resources.
Первичный источник обнаружения
- wnpa-sec-2017-31
wnpa-sec-2017-33
wnpa-sec-2017-26
wnpa-sec-2017-27
wnpa-sec-2017-28
wnpa-sec-2017-29
wnpa-sec-2017-30
wnpa-sec-2017-24
wnpa-sec-2017-32
wnpa-sec-2017-22
wnpa-sec-2017-23
wnpa-sec-2017-25
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2017-9343 warning
- CVE-2017-9344 warning
- CVE-2017-9345 critical
- CVE-2017-9346 critical
- CVE-2017-9347 warning
- CVE-2017-9349 critical
- CVE-2017-9350 critical
- CVE-2017-9351 warning
- CVE-2017-9352 critical
- CVE-2017-9353 warning
- CVE-2017-9354 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!