5
CVSSv2

CVE-2017-9347

Published: 02/06/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark

Vendor Advisories

Debian Bug report logs - #864058 New wireshark issues Package: src:wireshark; Maintainer for src:wireshark is Balint Reczey <rbalint@ubuntucom>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 3 Jun 2017 18:39:01 UTC Severity: important Tags: security, upstream Found in version wireshark/226+g32dac6a ...
An issue has been found in the ROS dissector of Wireshark < 227, where an NULL pointer dereference can be triggered by injecting a malicious packet into the wire or by convincing someone to read a malformed packet trace file ...

Exploits

Source: bugswiresharkorg/bugzilla/show_bugcgi?id=13637 Build Information: TShark (Wireshark) 230 (v230rc0-3235-gd97ce76161) Copyright 1998-2017 Gerald Combs <gerald@wiresharkorg> and contributors License GPLv2+: GNU GPL version 2 or later <wwwgnuorg/licenses/old-licenses/gpl-20html> This is free software; s ...