The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.
References
Link | Resource |
---|---|
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=137ab7d5681486c6d6cc8faac4300b7cd4ec0cf1 | Issue Tracking Patch |
https://code.wireshark.org/review/#/c/24997/ | Issue Tracking Patch |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14295 | Issue Tracking |
http://www.securityfocus.com/bid/102311 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html | Mailing List Third Party Advisory |
Information
Published : 2017-12-27 09:08
Updated : 2019-10-02 17:03
NVD link : CVE-2017-17935
Mitre link : CVE-2017-17935
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
debian
- debian_linux
wireshark
- wireshark