CVE-2017-6473Improper Input Validation in Wireshark

Severity
7.5HIGHNVD
EPSS
0.7%
top 27.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4
Latest updateMay 14

Description

In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.2.5+g440fd4d-2 (bookworm)
Debianwireshark/wireshark< 2.2.5+g440fd4d-2+3
NVDwireshark/wireshark2.0.02.0.10+1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q32q-vrj8-3f2c: In Wireshark 22022-05-14
OSV
CVE-2017-6473: In Wireshark 22017-03-04

📋Vendor Advisories

2
Red Hat
wireshark: K12 file parser crash (wnpa-sec-2017-09)2017-03-03
Debian
CVE-2017-6473: wireshark - In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser cras...2017

💬Community

2
Bugzilla
CVE-2017-6467 CVE-2017-6468 CVE-2017-6469 CVE-2017-6470 CVE-2017-6471 CVE-2017-6472 CVE-2017-6473 CVE-2017-6474 wireshark: various flaws [fedora-all]2017-03-06
Bugzilla
CVE-2017-6473 wireshark: K12 file parser crash (wnpa-sec-2017-09)2017-03-06