SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   Wireshark Vendors:   Wireshark.org
Wireshark Bugs in Multiple Dissectors Let Remote Users Cause the Application to Crash or Consume Excessive Memory Resources
SecurityTracker Alert ID:  1041036
SecurityTracker URL:  http://securitytracker.com/id/1041036
CVE Reference:   CVE-2018-11354, CVE-2018-11355, CVE-2018-11356, CVE-2018-11357, CVE-2018-11358, CVE-2018-11359, CVE-2018-11360, CVE-2018-11361, CVE-2018-11362   (Links to External Site)
Date:  Jun 4 2018
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.2.0 to 2.2.14, 2.4.0 to 2.4.6, 2.6.0
Description:   Multiple vulnerabilities were reported in Wireshark. A remote user can consume excessive memory on the target system. A remote user can cause the target service to crash.

A remote user can send specially crafted data to cause the target dissector to crash.

The LDSS dissector is affected [CVE-2018-11362].

The IEEE 1905.1a dissector is affected [CVE-2018-11354]

The RTCP dissector is affected [CVE-2018-11355]. Version 2.6.0 is affected.

The DNS dissector is affected [CVE-2018-11356].

The GSM A DTAP dissector is affected [CVE-2018-11360].

The Q.931 dissector is affected [CVE-2018-11358].

The IEEE 802.11 dissector is affected [CVE-2018-11361]. Version 2.6.0 is affected.

The RRC dissector and other dissectors are affected [CVE-2018-11359].

A remote user can send specially crafted data to cause the LTP and other dissectors to consume excessive memory on the target system [CVE-2018-11357].

The OSS-Fuzz project reported some of these vulnerabilities.

Impact:   A remote user can consume excessive memory resources on the target system.

A remote user can cause the target dissector to crash.

Solution:   The vendor has issued a fix (2.2.15, 2.4.7, 2.6.1).

The vendor advisories are available at:

https://www.wireshark.org/security/wnpa-sec-2018-25.html
https://www.wireshark.org/security/wnpa-sec-2018-26.html
https://www.wireshark.org/security/wnpa-sec-2018-27.html
https://www.wireshark.org/security/wnpa-sec-2018-28.html
https://www.wireshark.org/security/wnpa-sec-2018-29.html
https://www.wireshark.org/security/wnpa-sec-2018-30.html
https://www.wireshark.org/security/wnpa-sec-2018-31.html
https://www.wireshark.org/security/wnpa-sec-2018-32.html
https://www.wireshark.org/security/wnpa-sec-2018-33.html

Vendor URL:  www.wireshark.org/security/wnpa-sec-2018-25.html (Links to External Site)
Cause:   Resource error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC