ALT-PU-2017-2222-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-13764
In Wireshark 2.4.0, the Modbus dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/packet-mbtcp.c by adding length validation.
- 100545
- 100545
- 1039254
- 1039254
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13925
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13925
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b87ffbd12bddf64582c0a6e082b462744474de94
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b87ffbd12bddf64582c0a6e082b462744474de94
- https://www.wireshark.org/security/wnpa-sec-2017-40.html
- https://www.wireshark.org/security/wnpa-sec-2017-40.html
Modified: 2024-11-21
CVE-2017-13765
In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.
- 100551
- 100551
- 1039254
- 1039254
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94666d4357096fc45e3bcad3d9414a14f0831bc8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94666d4357096fc45e3bcad3d9414a14f0831bc8
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-41.html
- https://www.wireshark.org/security/wnpa-sec-2017-41.html
Modified: 2024-11-21
CVE-2017-13766
In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation.
- 100542
- 100542
- 1039254
- 1039254
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2096bc1e5078732543e0a3ee115a2ce520a72bbc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2096bc1e5078732543e0a3ee115a2ce520a72bbc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=af7b093ca528516c14247acb545046199d30843e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=af7b093ca528516c14247acb545046199d30843e
- DSA-4060
- DSA-4060
- https://www.wireshark.org/security/wnpa-sec-2017-39.html
- https://www.wireshark.org/security/wnpa-sec-2017-39.html
Modified: 2024-11-21
CVE-2017-13767
In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the MSDP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-msdp.c by adding length validation.
- 100549
- 100549
- 1039254
- 1039254
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13933
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13933
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f18ace2a2683418a9368a8dfd92da6bd8213e15
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f18ace2a2683418a9368a8dfd92da6bd8213e15
- https://www.wireshark.org/security/wnpa-sec-2017-38.html
- https://www.wireshark.org/security/wnpa-sec-2017-38.html