ALT-PU-2018-1290-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-6836
The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397
- https://code.wireshark.org/review/#/c/25660/
- https://code.wireshark.org/review/#/c/25660/
- https://code.wireshark.org/review/#/c/25660/2/wiretap/netmon.c
- https://code.wireshark.org/review/#/c/25660/2/wiretap/netmon.c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=28960d79cca262ac6b974f339697b299a1e28fef
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=28960d79cca262ac6b974f339697b299a1e28fef
Modified: 2024-11-21
CVE-2018-7320
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.
- 103160
- 103160
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14398
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14398
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=015e3399390b8b5cfbfcfcda30589983ab6cc129
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=015e3399390b8b5cfbfcfcda30589983ab6cc129
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-10.html
- https://www.wireshark.org/security/wnpa-sec-2018-10.html
Modified: 2024-11-21
CVE-2018-7321
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14379
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14379
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c784d551ad50864de1035ce54e72837301cf6aca
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c784d551ad50864de1035ce54e72837301cf6aca
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7322
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14411
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14411
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afc780e2c796e971bb7d164103f4f0d10d3c25b5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afc780e2c796e971bb7d164103f4f0d10d3c25b5
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7323
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14412
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14412
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f9199ea8cff56c6704e9828c3d80360b27c4565
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f9199ea8cff56c6704e9828c3d80360b27c4565
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5d45b69b590cabc5127282d1ade3bca1598e5f5c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5d45b69b590cabc5127282d1ade3bca1598e5f5c
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7324
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14413
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14413
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9e7695bbee18525eaa6d12b32230313ae8a36a81
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9e7695bbee18525eaa6d12b32230313ae8a36a81
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7325
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14414
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14414
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7be234d06ea39ab6a88115ae41d71060f1f15e3c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7be234d06ea39ab6a88115ae41d71060f1f15e3c
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7326
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14419
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14419
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=293b999425e998d6cde0d9149648e421ea7687d0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=293b999425e998d6cde0d9149648e421ea7687d0
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7327
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14420
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14420
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=563989f888e51258edb9a27db56124bdc33c9afe
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=563989f888e51258edb9a27db56124bdc33c9afe
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7328
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14421
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14421
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69d09028c956f6e049145485ce9b3e2858789b2b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69d09028c956f6e049145485ce9b3e2858789b2b
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7329
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14423
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14423
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d8a0cbc4f2979e0b1cadbe79f0b8b4ecb92477be
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d8a0cbc4f2979e0b1cadbe79f0b8b4ecb92477be
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7330
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14428
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14428
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7331
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14444
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14444
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=157712b2f5f89b19ef2497ea89c5938eb29529da
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=157712b2f5f89b19ef2497ea89c5938eb29529da
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7332
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14445
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14445
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1ab0585098c7ce20f3afceb6730427cc2a1e98ea
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1ab0585098c7ce20f3afceb6730427cc2a1e98ea
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7333
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14449
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14449
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bd6313181317bfe83842b27650b65f3c2b8d5dc9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bd6313181317bfe83842b27650b65f3c2b8d5dc9
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7334
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.
- 103162
- 103162
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14339
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14339
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed705e1227d3d582e3f0de435bba606d053d686
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed705e1227d3d582e3f0de435bba606d053d686
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-07.html
- https://www.wireshark.org/security/wnpa-sec-2018-07.html
Modified: 2024-11-21
CVE-2018-7335
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the IEEE 802.11 dissector could crash. This was addressed in epan/crypt/airpdcap.c by rejecting lengths that are too small.
- 103165
- 103165
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14442
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14442
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a2901dcf45c9f1b07abfbf2a0b0cd654371d72a4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a2901dcf45c9f1b07abfbf2a0b0cd654371d72a4
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-05.html
- https://www.wireshark.org/security/wnpa-sec-2018-05.html
Modified: 2024-11-21
CVE-2018-7336
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the FCP protocol dissector could crash. This was addressed in epan/dissectors/packet-fcp.c by checking for a NULL pointer.
- 103166
- 103166
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14374
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14374
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b56f598f1bc04f5d00f13b38c713763928cedb7c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b56f598f1bc04f5d00f13b38c713763928cedb7c
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-09.html
- https://www.wireshark.org/security/wnpa-sec-2018-09.html
Modified: 2024-11-21
CVE-2018-7337
In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs.
- 103164
- 103164
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14446
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14446
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=511a8b0b546d25413e289dc5a7d3a455a33994c2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=511a8b0b546d25413e289dc5a7d3a455a33994c2
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-08.html
- https://www.wireshark.org/security/wnpa-sec-2018-08.html
Modified: 2024-11-21
CVE-2018-7417
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the IPMI dissector could crash. This was addressed in epan/dissectors/packet-ipmi-picmg.c by adding support for crafted packets that lack an IPMI header.
- 103156
- 103156
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14409
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14409
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81216a176b25dd8a616e11808a951e141a467009
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81216a176b25dd8a616e11808a951e141a467009
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-12.html
- https://www.wireshark.org/security/wnpa-sec-2018-12.html
Modified: 2024-11-21
CVE-2018-7418
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.
- 103157
- 103157
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14410
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14410
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=29d920b8309905dda11ad397596fe8aafc9b4bf7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=29d920b8309905dda11ad397596fe8aafc9b4bf7
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-13.html
- https://www.wireshark.org/security/wnpa-sec-2018-13.html
Modified: 2024-11-21
CVE-2018-7419
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the NBAP dissector could crash. This was addressed in epan/dissectors/asn1/nbap/nbap.cnf by ensuring DCH ID initialization.
- 103159
- 103159
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14443
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14443
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bebd3a1f50b0a27738d8d3da5b33c1b392eb7273
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bebd3a1f50b0a27738d8d3da5b33c1b392eb7273
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-14.html
- https://www.wireshark.org/security/wnpa-sec-2018-14.html
Modified: 2024-11-21
CVE-2018-7420
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks.
- 103163
- 103163
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14403
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14403
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=129e41f9f63885ad8224ef413c2860788fb9e849
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=129e41f9f63885ad8224ef413c2860788fb9e849
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-11.html
- https://www.wireshark.org/security/wnpa-sec-2018-11.html
Modified: 2024-11-21
CVE-2018-7421
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14408
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14408
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=656812ee1f2a8ddfd383b02a066e888f5919e17a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=656812ee1f2a8ddfd383b02a066e888f5919e17a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e8be5adae469ba563acfad2c2b98673e1afaf901
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e8be5adae469ba563acfad2c2b98673e1afaf901
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html