Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-9353Improper Input Validation in Wireshark

Severity
7.5HIGHNVD
EPSS
7.1%
top 8.42%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 2
Latest updateMay 14

Description

In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.2.7-1 (bookworm)
Debianwireshark/wireshark< 2.2.7-1+3
NVDwireshark/wireshark2.2.02.2.6

Patches

🔴Vulnerability Details

2
GHSA
GHSA-32qj-cm92-hg4r: In Wireshark 22022-05-14
OSV
CVE-2017-9353: In Wireshark 22017-06-02

💥Exploits & PoCs

1
Exploit-DB
Wireshark 2.2.6 - IPv6 Dissector Denial of Service2017-06-05

📋Vendor Advisories

2
Red Hat
wireshark: IPv6 dissector crash (wnpa-sec-2017-33)2017-06-01
Debian
CVE-2017-9353: wireshark - In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed ...2017

💬Community

2
Bugzilla
CVE-2017-11411 CVE-2017-9343 CVE-2017-9344 CVE-2017-9345 CVE-2017-9346 CVE-2017-9347 CVE-2017-9348 CVE-2017-9349 CVE-2017-9350 CVE-2017-9351 CVE-2017-9352 CVE-2017-9353 CVE-2017-9354 wireshark: variou2017-06-02
Bugzilla
CVE-2017-9353 wireshark: IPv6 dissector crash (wnpa-sec-2017-33)2017-06-02