CVE-2013-1581Improper Input Validation in Wireshark

Severity
2.9LOWNVD
EPSS
0.2%
top 54.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 3
Latest updateMay 17

Description

The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.

CVSS vector

AV:A/AC:M/C:N/I:N/A:PExploitability: 5.5 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.8.6-1 (bookworm)
Debianwireshark/wireshark< 1.8.6-1+3
NVDwireshark/wireshark18 versions+17

🔴Vulnerability Details

2
GHSA
GHSA-7297-8jrv-w9vj: The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi2022-05-17
OSV
CVE-2013-1581: The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi2013-02-03

📋Vendor Advisories

3
Red Hat
libvirt: unprivileged user can crash libvirtd during spice migration2013-09-19
Red Hat
wireshark: Infinite loop in the DCP-ETSI dissector (wnpa-sec-2013-01, bug 8222)2013-01-29
Debian
CVE-2013-1581: wireshark - The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in th...2013

💬Community

2
Bugzilla
wireshark: Upstream v1.8.5, and v1.6.13 fixes [fedora-all]2013-01-31
Bugzilla
CVE-2013-1581 wireshark: Infinite loop in the DCP-ETSI dissector (wnpa-sec-2013-01, bug 8222)2013-01-31