CVE-2017-6468Improper Input Validation in Wireshark

Severity
7.5HIGHNVD
EPSS
0.7%
top 27.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4
Latest updateMay 14

Description

In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser crash, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating the relationship between pages and records.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.2.5+g440fd4d-2 (bookworm)
Debianwireshark/wireshark< 2.2.5+g440fd4d-2+3
NVDwireshark/wireshark2.0.02.0.10+1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6fjq-56r5-pmmm: In Wireshark 22022-05-14
OSV
CVE-2017-6468: In Wireshark 22017-03-04

📋Vendor Advisories

2
Red Hat
wireshark: NetScaler file parser crash (wnpa-sec-2017-08)2017-03-03
Debian
CVE-2017-6468: wireshark - In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parse...2017

💬Community

2
Bugzilla
CVE-2017-6468 wireshark: NetScaler file parser crash (wnpa-sec-2017-08)2017-03-06
Bugzilla
CVE-2017-6467 CVE-2017-6468 CVE-2017-6469 CVE-2017-6470 CVE-2017-6471 CVE-2017-6472 CVE-2017-6473 CVE-2017-6474 wireshark: various flaws [fedora-all]2017-03-06