Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9351

Опубликовано: 02 июн. 2017
Источник: debian
EPSS Низкий

Описание

In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.2.7-1package
wiresharkno-dsajessiepackage
wiresharkno-dsawheezypackage

Примечания

  • https://www.wireshark.org/security/wnpa-sec-2017-24.html

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609

EPSS

Процентиль: 73%
0.00768
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.

CVSS3: 5.9
redhat
больше 8 лет назад

In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.

CVSS3: 7.5
nvd
больше 8 лет назад

In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.

CVSS3: 7.5
github
больше 3 лет назад

In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.

suse-cvrf
больше 8 лет назад

Security update for wireshark

EPSS

Процентиль: 73%
0.00768
Низкий