KLA11034
Multiple vulnerabilities in Wireshark

Обновлено: 26/09/2023
Дата обнаружения
02/06/2017
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities possibly to cause a denial of service.

Below is a complete list of vulnerabilities:

  1. An improper handling of dividing by zero in the L2CAP dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  2. Multiple unspecified vulnerabilities in the MSNIP, RGMP, IPv6 dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  3. An unspecified vulnerability in the openSAFETY dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  4. An infinite loop in the DICOM dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  5. Infinite loops in the DNS, SoulSeek and Bazaar dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  6. An out-of-bounds read in the DHCP and DOF dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  7. A null pointer dereference in the ROS dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;

Technical details

In case of vulnerability (3), denial of service can be a crash or a system memory exhaustion.

Denial of service, which might become a result of exploiting vulnerabilities (5), occurs because of consuming excessive CPU resources.

Пораженные продукты

Wireshark 2.0.x before 2.0.13
Wireshark 2.2.x before 2.2.7

Решение

Update to the latest version
Download Wireshark

Первичный источник обнаружения
wnpa-sec-2017-31
wnpa-sec-2017-33
wnpa-sec-2017-26
wnpa-sec-2017-27
wnpa-sec-2017-28
wnpa-sec-2017-29
wnpa-sec-2017-30
wnpa-sec-2017-24
wnpa-sec-2017-32
wnpa-sec-2017-22
wnpa-sec-2017-23
wnpa-sec-2017-25
Оказываемое влияние
?
DoS 
[?]
Связанные продукты
Wireshark
CVE-IDS
CVE-2017-93435.0Critical
CVE-2017-93445.0Critical
CVE-2017-93457.8Critical
CVE-2017-93467.8Critical
CVE-2017-93475.0Critical
CVE-2017-93497.8Critical
CVE-2017-93507.8Critical
CVE-2017-93515.0Critical
CVE-2017-93527.8Critical
CVE-2017-93535.0Critical
CVE-2017-93545.0Critical
Эксплуатация

Public exploits exist for this vulnerability.

Узнай статистику распространения уязвимостей в твоем регионе