Skip to main content

Wireshark Multiple Denial of Service Vulnerabilities

Last Update Date: 30 Nov 2012 Release Date: 29 Nov 2012 4802 Views

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  1. An error in the USB dissector (epan/dissectors/packet-usb.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  2. An error in the sFlow dissector (epan/dissectors/packet-sflow.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  3. An error in the SCTP dissector (epan/dissectors/packet-sctp.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  4. An error in the EIGRP dissector (epan/dissectors/packet-eigrp.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  5. An error within the ISAKMP dissector (epan/dissectors/packet-isakmp.c) when handling IKEv2 data can be exploited to cause a crash.
  6. An error in the iSCSI dissector (epan/dissectors/packet-iscsi.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  7. An error in the WTP dissector (epan/dissectors/packet-wtp.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  8. An error in the RTCP dissector (epan/dissectors/packet-rtcp.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  9. An error in the 3GPP2 A11 dissector (epan/dissectors/packet-3g-a11.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  10. An error in the ICMPv6 dissector (epan/dissectors/packet-icmpv6.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
  11. A vulnerability exists due to the application disclosing hostname information when creating Pcap-ng files.