CVE-2019-9209Off-by-one Error in Wireshark

Severity
5.5MEDIUMNVD
EPSS
0.5%
top 33.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 28
Latest updateMay 13

Description

In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/wireshark< wireshark 2.6.7-1 (bookworm)
Debianwireshark/wireshark< 2.6.7-1+3
NVDwireshark/wireshark2.4.02.4.12+1
NVDopensuse/leap15.0, 15.1, 42.3+2

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 16.04, 18.04, 18.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2cjg-pfcc-g8hr: In Wireshark 22022-05-13
OSV
CVE-2019-9209: In Wireshark 22019-02-28

📋Vendor Advisories

3
Ubuntu
Wireshark vulnerabilities2019-05-16
Red Hat
wireshark: Stack-based off-by-one buffer overflow in dissect_ber_GeneralizedTime2019-01-25
Debian
CVE-2019-9209: wireshark - In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related disse...2019

💬Community

1
Bugzilla
CVE-2019-9209 wireshark: Stack-based off-by-one buffer overflow in dissect_ber_GeneralizedTime2019-03-04