CVE-2018-14367Unchecked Return Value in Wireshark

Severity
7.5HIGHNVD
EPSS
0.6%
top 31.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 19
Latest updateMay 13

Description

In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.6.2-1 (bookworm)
Debianwireshark/wireshark< 2.6.2-1+3
NVDwireshark/wireshark2.4.02.4.7+1

🔴Vulnerability Details

2
GHSA
GHSA-5426-cch2-9rw5: In Wireshark 22022-05-13
OSV
CVE-2018-14367: In Wireshark 22018-07-19

📋Vendor Advisories

2
Red Hat
wireshark: CoAP dissector infinite loop (wnpa-sec-2018-42)2018-07-18
Debian
CVE-2018-14367: wireshark - In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector coul...2018

💬Community

2
Bugzilla
CVE-2018-14367 wireshark: CoAP dissector infinite loop (wnpa-sec-2018-42)2018-07-23
Bugzilla
CVE-2018-14339 CVE-2018-14340 CVE-2018-14341 CVE-2018-14342 CVE-2018-14343 CVE-2018-14344 CVE-2018-14367 CVE-2018-14368 CVE-2018-14369 CVE-2018-14370 wireshark: various flaws [fedora-all]2018-07-23