CVE-2018-7320Heap-based Buffer Overflow in Wireshark

Severity
7.5HIGHNVD
EPSS
0.7%
top 27.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 23
Latest updateMay 13

Description

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.4.5-1 (bookworm)
Debianwireshark/wireshark< 2.4.5-1+3
NVDwireshark/wireshark2.2.02.2.12+1

Also affects: Debian Linux 8.0, 9.0

🔴Vulnerability Details

2
GHSA
GHSA-45vr-8xvm-rhpc: In Wireshark 22022-05-13
OSV
CVE-2018-7320: In Wireshark 22018-02-23

📋Vendor Advisories

3
Red Hat
gnome-keyring: login credentials retrieval via a Secret Service API call2018-07-06
Red Hat
wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c2018-02-06
Debian
CVE-2018-7320: wireshark - In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector ...2018

💬Community

2
Bugzilla
CVE-2018-7320 wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c2018-02-26
Bugzilla
CVE-2018-7320 wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c [fedora-all]2018-02-26