Skip to main content

Wireshark Multiple Vulnerabilities

Last Update Date: 31 Jan 2013 15:36 Release Date: 31 Jan 2013 4098 Views

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  1. Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets.
  2. An error in the CLNP, DTN, MS-MMC, DTLS and ROHC dissector, and the dissection engine when processing certain packets can be exploited to cause a crash via a specially crafted packet.
  3. An error in the DCP-ETSI dissector when processing certain packets can be exploited to cause a memory corruption via a specially crafted packet.
  4. An error in the NTLMSSP dissector when processing certain packets can be exploited to cause a buffer overflow via a specially crafted packet.

Successful exploitation of this vulnerability may allow execution of arbitrary code.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Versions prior to 1.8.5 and 1.6.13

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 1.8.5 or 1.6.13.

Vulnerability Identifier

  • No CVE information is available

Source


Related Link