5
CVSSv2

CVE-2013-3556

Published: 25/05/2013 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote malicious users to cause a denial of service (application crash) via a malformed packet.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 1.6.1

wireshark wireshark 1.6.3

wireshark wireshark 1.6.10

wireshark wireshark 1.6.12

wireshark wireshark 1.6.5

wireshark wireshark 1.6.6

wireshark wireshark 1.6.7

wireshark wireshark 1.6.8

wireshark wireshark 1.6.13

wireshark wireshark 1.6.14

wireshark wireshark 1.6.0

wireshark wireshark 1.6.2

wireshark wireshark 1.6.4

wireshark wireshark 1.6.9

wireshark wireshark 1.6.11

opensuse opensuse 12.2

debian debian linux 7.0

opensuse opensuse 12.3

opensuse opensuse 11.4

wireshark wireshark 1.8.5

wireshark wireshark 1.8.0

wireshark wireshark 1.8.1

wireshark wireshark 1.8.2

wireshark wireshark 1.8.3

wireshark wireshark 1.8.4

wireshark wireshark 1.8.6

Vendor Advisories

Debian Bug report logs - #709167 wireshark: Security vulnerabilities fixed in 187 (CVE-2013-3555 to CVE-2013-3562) Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Henri Salo <henri@nervfi> Date: Tue, 21 May ...
The fragment_add_seq_common function in epan/reassemblec in the ASN1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet ...