5.5
CVSSv3

CVE-2018-19625

Published: 29/11/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the dissection engine could crash. This was addressed in epan/tvbuff_composite.c by preventing a heap-based buffer over-read.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Multiple vulnerabilities have been discovered in Wireshark, a network protocol analyzer, which could result in denial of service or the execution of arbitrary code For the stable distribution (stretch), these problems have been fixed in version 265-1~deb9u1 We recommend that you upgrade your wireshark packages For the detailed security status ...
An out of bounds heap read vulnerability in the dissection engine could allow Wireshark to crash when parsing a specially crafted pcap file A remote attacker could cause a denial of service to Wireshark by injecting malicious packets into the network that are automatically processed ...
An out-of-bounds read has been found in the dissection engine of Wireshark versions prior to 265, which could be triggered by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file ...