CVE-2013-4926Improper Input Validation in Wireshark

Severity
5.0MEDIUMNVD
EPSS
1.1%
top 22.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 30
Latest updateMay 17

Description

epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.10.1-1 (bookworm)
Debianwireshark/wireshark< 1.10.1-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-gx94-9gqg-xx4q: epan/dissectors/packet-dcom-sysact2022-05-17
OSV
CVE-2013-4926: epan/dissectors/packet-dcom-sysact2013-07-30

📋Vendor Advisories

2
Red Hat
wireshark: DoS in the DCOM ISystemActivator dissector due improper remaining data to process presence check (wnpa-sec-2013-44)2013-07-26
Debian
CVE-2013-4926: wireshark - epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in W...2013

💬Community

2
Bugzilla
CVE-2013-4926 wireshark: DoS in the DCOM ISystemActivator dissector due improper remaining data to process presence check (wnpa-sec-2013-44)2013-07-30
Bugzilla
wireshark: 17 CVEs fixed within 1.10.1 version [fedora-19]2013-07-30