KLA11034
Multiple vulnerabilities in Wireshark
Обновлено: 26/06/2019
Дата обнаружения
02/06/2017
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities possibly to cause a denial of service.

Below is a complete list of vulnerabilities:

  1. An improper handling of dividing by zero in the L2CAP dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  2. Multiple unspecified vulnerabilities in the MSNIP, RGMP, IPv6 dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  3. An unspecified vulnerability in the openSAFETY dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  4. An infinite loop in the DICOM dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  5. Infinite loops in the DNS, SoulSeek and Bazaar dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  6. An out-of-bounds read in the DHCP and DOF dissectors can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;
  7. A null pointer dereference in the ROS dissector can be exploited remotely via a specially designed packet, which is injected onto the wire, or by convincing a user to handle a specially designed packet trace file to cause a denial of service;

Technical details

In case of vulnerability (3), denial of service can be a crash or a system memory exhaustion.

Denial of service, which might become a result of exploiting vulnerabilities (5), occurs because of consuming excessive CPU resources.

Пораженные продукты

Wireshark 2.0.x before 2.0.13
Wireshark 2.2.x before 2.2.7

Решение

Update to the latest version
Download Wireshark

Первичный источник обнаружения
wnpa-sec-2017-31
wnpa-sec-2017-33
wnpa-sec-2017-26
wnpa-sec-2017-27
wnpa-sec-2017-28
wnpa-sec-2017-29
wnpa-sec-2017-30
wnpa-sec-2017-24
wnpa-sec-2017-32
wnpa-sec-2017-22
wnpa-sec-2017-23
wnpa-sec-2017-25
Оказываемое влияние
?
DoS 
[?]
Связанные продукты
Wireshark
CVE-IDS
CVE-2017-93435.0Critical
CVE-2017-93445.0Critical
CVE-2017-93457.8Critical
CVE-2017-93467.8Critical
CVE-2017-93475.0Critical
CVE-2017-93497.8Critical
CVE-2017-93507.8Critical
CVE-2017-93515.0Critical
CVE-2017-93527.8Critical
CVE-2017-93535.0Critical
CVE-2017-93545.0Critical