CVE-2013-6340Improper Input Validation in Wireshark

Severity
4.3MEDIUMNVD
EPSS
0.9%
top 24.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 4
Latest updateMay 17

Description

epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.10.3-1 (bookworm)
Debianwireshark/wireshark< 1.10.3-1+3
NVDwireshark/wireshark14 versions+13

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xc26-f3vv-9p8g: epan/dissectors/packet-tcp2022-05-17
OSV
CVE-2013-6340: epan/dissectors/packet-tcp2013-11-04

📋Vendor Advisories

2
Red Hat
wireshark: TCP dissector crash (wnpa-sec-2013-65)2013-11-01
Debian
CVE-2013-6340: wireshark - epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8....2013

💬Community

2
Bugzilla
CVE-2013-6340 CVE-2013-6337 CVE-2013-6336 CVE-2013-6339 CVE-2013-6338 wireshark: various flaws [fedora-all]2013-11-04
Bugzilla
CVE-2013-6340 wireshark: TCP dissector crash (wnpa-sec-2013-65)2013-11-04