5.5
CVSSv3

CVE-2018-19626

Published: 29/11/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the DCOM dissector could crash. This was addressed in epan/dissectors/packet-dcom.c by adding '\0' termination.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Multiple vulnerabilities have been discovered in Wireshark, a network protocol analyzer, which could result in denial of service or the execution of arbitrary code For the stable distribution (stretch), these problems have been fixed in version 265-1~deb9u1 We recommend that you upgrade your wireshark packages For the detailed security status ...
Missing initialization of buffer in DCOM dissector could allow Wireshark to crash when parsing a specially crafted pcap file A remote attacker could cause a denial of service to Wireshark by injecting malicious packets into the network that are automatically processed Moreover, the content of uninitialized stack memory is leaked to the local user ...
An out-of-bounds read has been found in the DCOM dissector of Wireshark versions prior to 265, which could be triggered by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file ...