Kaspersky ID:
KLA11377
Bulunma tarihi:
11/27/2018
Yüklendi:
01/28/2026

Açıklama

Multiple serious vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A heap buffer over-read vulnerability in the Wireshark dissection engine can be exploited remotely via malformed packet to cause denial of service;
  2. An improper null termination vulnerability in the DCOM dissector can be exploited remotely via malformed packet to cause denial of service;
  3. An improper input validation vulnerability in the LBMPDM dissector can be exploited remotely via malformed packet to cause denial of service and bypass security restrictions;
  4. An infinite loop vulnerability in the MMSE dissector can be exploited remotely via malformed packet to cause denial of service;
  5. A heap buffer overflow vulnerability in the IxVeriWave file parser can be exploited remotely via malformed packet to cause denial of service;
  6. A NULL pointer dereference vulnerability in the PVFS dissector can be exploited remotely via malformed packet to cause denial of service;
  7. A division by zero vulnerability in the ZigBee ZCL dissector can be exploited remotely via malformed packet to cause denial of service;

Orijinal öneriler

Kötüye kullanma

Public exploits exist for this vulnerability.

İlgili ürünler

CVE Listesi

  • CVE-2018-19625
    high
  • CVE-2018-19626
    high
  • CVE-2018-19623
    critical
  • CVE-2018-19622
    critical
  • CVE-2018-19627
    critical
  • CVE-2018-19624
    high
  • CVE-2018-19628
    critical

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.