ID CVE-2013-4929
Summary The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
References
Vulnerable Configurations
  • cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 19-09-2017 - 01:36)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
oval via4
accepted 2013-09-09T04:00:41.587-04:00
class vulnerability
contributors
name Shane Shaffer
organization G2, Inc.
definition_extensions
comment Wireshark is installed on the system.
oval oval:org.mitre.oval:def:6589
description The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
family windows
id oval:org.mitre.oval:def:17028
status accepted
submitted 2013-07-30T13:45:45.734-04:00
title The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes
version 5
refmap via4
confirm
gentoo GLSA-201308-05
secunia
  • 54296
  • 54371
  • 54425
suse
  • openSUSE-SU-2013:1295
  • openSUSE-SU-2013:1300
Last major update 19-09-2017 - 01:36
Published 30-07-2013 - 00:56
Last modified 19-09-2017 - 01:36
Back to Top