Kaspersky ID:
KLA11377
Дата обнаружения:
27/11/2018
Обновлено:
22/01/2024

Описание

Multiple serious vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A heap buffer over-read vulnerability in the Wireshark dissection engine can be exploited remotely via malformed packet to cause denial of service;
  2. An improper null termination vulnerability in the DCOM dissector can be exploited remotely via malformed packet to cause denial of service;
  3. An improper input validation vulnerability in the LBMPDM dissector can be exploited remotely via malformed packet to cause denial of service and bypass security restrictions;
  4. An infinite loop vulnerability in the MMSE dissector can be exploited remotely via malformed packet to cause denial of service;
  5. A heap buffer overflow vulnerability in the IxVeriWave file parser can be exploited remotely via malformed packet to cause denial of service;
  6. A NULL pointer dereference vulnerability in the PVFS dissector can be exploited remotely via malformed packet to cause denial of service;
  7. A division by zero vulnerability in the ZigBee ZCL dissector can be exploited remotely via malformed packet to cause denial of service;

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Связанные продукты

Список CVE

  • CVE-2018-19625
    warning
  • CVE-2018-19626
    warning
  • CVE-2018-19623
    warning
  • CVE-2018-19622
    warning
  • CVE-2018-19627
    warning
  • CVE-2018-19624
    warning
  • CVE-2018-19628
    warning

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.