Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-17935

Опубликовано: 27 дек. 2017
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wiresharkWill not fix
Red Hat Enterprise Linux 6wiresharkWill not fix
Red Hat Enterprise Linux 7wiresharkWill not fix
Red Hat Enterprise Linux 8wiresharkNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1529592Wireshark: denial of service in the File_read_line function in epan/wslua/wslua_file.c

EPSS

Процентиль: 68%
0.00582
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

CVSS3: 7.5
nvd
около 8 лет назад

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

CVSS3: 7.5
debian
около 8 лет назад

The File_read_line function in epan/wslua/wslua_file.c in Wireshark th ...

CVSS3: 7.5
github
больше 3 лет назад

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

suse-cvrf
около 8 лет назад

Security update for wireshark

EPSS

Процентиль: 68%
0.00582
Низкий

4.3 Medium

CVSS3