CVE-2013-3556Improper Input Validation in Wireshark

Severity
5.0MEDIUMNVD
EPSS
1.5%
top 18.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 25
Latest updateMay 14

Description

The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

NVDwireshark/wireshark22 versions+21
NVDopensuse/opensuse11.4, 12.2, 12.3+2

Also affects: Debian Linux 7.0

🔴Vulnerability Details

1
GHSA
GHSA-jhcv-c76w-jfvj: The fragment_add_seq_common function in epan/reassemble2022-05-14

📋Vendor Advisories

2
Red Hat
wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)2013-05-17
Debian
CVE-2013-3556: wireshark - The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER disse...2013

💬Community

2
Bugzilla
CVE-2013-3556 wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)2013-05-22
Bugzilla
CVE-2013-3557 wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)2013-05-20