Published: 09/06/2013 Updated: 19/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x prior to 1.8.8 does not properly handle a zero-length item, which allows remote malicious users to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 1.8.0

wireshark wireshark 1.8.1

wireshark wireshark 1.8.7

wireshark wireshark 1.8.2

wireshark wireshark 1.8.3

wireshark wireshark 1.8.4

wireshark wireshark 1.8.5

wireshark wireshark 1.8.6

Vendor Advisories

Debian Bug report logs - #711918 wireshark: Multiple vulnerabilities in wireshark dissectors Package: src:wireshark; Maintainer for src:wireshark is Balint Reczey <rbalint@ubuntucom>; Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Mon, 10 Jun 2013 21:30:02 UTC Severity: serious Fixed in versions wireshar ...