CVE-2013-3557Improper Restriction of Operations within the Bounds of a Memory Buffer in Wireshark

Severity
5.0MEDIUMNVD
EPSS
4.2%
top 11.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 25
Latest updateMay 14

Description

The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages4 packages

debiandebian/wireshark< wireshark 1.8.7-1 (bookworm)
Debianwireshark/wireshark< 1.8.7-1+3
NVDwireshark/wireshark22 versions+21
NVDopensuse/opensuse11.4, 12.2, 12.3+2

Also affects: Debian Linux 7.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hp72-9f76-93p7: The dissect_ber_choice function in epan/dissectors/packet-ber2022-05-14
OSV
CVE-2013-3557: The dissect_ber_choice function in epan/dissectors/packet-ber2013-05-25

📋Vendor Advisories

2
Red Hat
wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)2013-05-17
Debian
CVE-2013-3557: wireshark - The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER...2013

💬Community

1
Bugzilla
CVE-2013-3557 wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)2013-05-20