Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-2488

Опубликовано: 07 мар. 2013
Источник: debian
EPSS Низкий

Описание

The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed1.8.2-5package
wiresharkfixed1.8.2-5wheezy1wheezypackage

Примечания

  • http://www.wireshark.org/security/wnpa-sec-2013-22.html

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8380

  • Versions affected: 1.8.0 to 1.8.X, 1.6.0 to 1.6.X

EPSS

Процентиль: 88%
0.03866
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.

redhat
почти 13 лет назад

The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.

nvd
почти 13 лет назад

The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.

github
больше 3 лет назад

The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.

EPSS

Процентиль: 88%
0.03866
Низкий