Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17935

Опубликовано: 27 дек. 2017
Источник: debian
EPSS Низкий

Описание

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.4.4-1package
wiresharkignoredwheezypackage

Примечания

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14295

  • https://code.wireshark.org/review/#/c/24997/

  • https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=137ab7d5681486c6d6cc8faac4300b7cd4ec0cf1

EPSS

Процентиль: 68%
0.00582
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

CVSS3: 4.3
redhat
около 8 лет назад

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

CVSS3: 7.5
nvd
около 8 лет назад

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

CVSS3: 7.5
github
больше 3 лет назад

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

suse-cvrf
около 8 лет назад

Security update for wireshark

EPSS

Процентиль: 68%
0.00582
Низкий