CVE-2017-9352
https://notcve.org/view.php?id=CVE-2017-9352
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur. Fue encontrada una Vulnerabilidad en Wireshark versión 2.2.0 hasta 2.2.6 y versión 2.0.0 hasta 2.0.12, el disector Bazaar podría entrar en un bucle infinito. Esto se solucionó en EPAN/dissectors/Packet-BZR.c mediante el aseguramiento de que no ocurra el análisis hacia atrás. • http://www.securityfocus.com/bid/98804 http://www.securitytracker.com/id/1038612 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8c5e0cee278ff0678b0ebf4b9c2a614974b4029a https://www.wireshark.org/security/wnpa-sec-2017-22.html • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2017-9353 – Wireshark 2.2.6 - IPv6 Dissector Denial of Service
https://notcve.org/view.php?id=CVE-2017-9353
In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address. Fue encontrada una Vulnerabilidad en Wireshark versión 2.2.0 hasta la versión 2.2.6, el disector IPv6 puede fallar. Esto se solucionó en EPAN/dissectors/Packet-IPv6.c comprobando una dirección IPv6. Wireshark version 2.2.6 suffers from an IPv6 dissector denial of service vulnerability. • https://www.exploit-db.com/exploits/42123 http://www.securityfocus.com/bid/98805 http://www.securitytracker.com/id/1038612 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1303 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b2d475c2ad550c1a0f536d5eb30f2a7404c4f0 https://www.wireshark.org/security/wnpa-sec-2017-33.html • CWE-20: Improper Input Validation •
CVE-2017-9354
https://notcve.org/view.php?id=CVE-2017-9354
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address. En Wireshark de 2.2.0 a 2.2.6 y 2.0.0 y 2.0.0 a 2.0.12, el disector RGMP podría caer. Esto fue dirigido a epan/dissectors/packet-rgmp.c mediante la validación de una dirección IPv4. • http://www.securityfocus.com/bid/98802 http://www.securitytracker.com/id/1038612 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1243 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3a77395e651acd81eb41ffd8fbdbf711e1133d76 https://www.wireshark.org/security/wnpa-sec-2017-32.html • CWE-20: Improper Input Validation •
CVE-2017-9345
https://notcve.org/view.php?id=CVE-2017-9345
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers. En Wireshark versión 2.2.0 hasta 2.2.6 y versión 2.0.0 hasta 2.0.12, el disector DNS podría entrar en un bucle infinito. Esto se ha dirigido a epan/dissectors/packet-dns.c al tratar de detectar autoreferencia de punteros. • http://www.securityfocus.com/bid/98798 http://www.securitytracker.com/id/1038612 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e280c9b637327a65d132bfe72d917b87e6844eb5 https://www.wireshark.org/security/wnpa-sec-2017-26.html • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2017-9347 – Wireshark 2.2.0 < 2.2.12 - ROS Dissector Denial of Service
https://notcve.org/view.php?id=CVE-2017-9347
In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID. En Wireshark versión 2.2.0 hasta 2.2.6, el disector ROS podría bloquearse con una desreferencia de puntero NULL. Esto fue dirigido en el archivo epan/dissectors/asn1/ros/packet-ros-template.c mediante la validación de un OID. Wireshark versions 2.2.0 through 2.2.12 suffer from a ROS dissector denial of service vulnerability. • https://www.exploit-db.com/exploits/42124 http://www.securityfocus.com/bid/98800 http://www.securitytracker.com/id/1038612 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1216 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=278e52f26e7e1a23f8d2e8ed98693328c992bdce https://www.wireshark.org/security/wnpa-sec-2017-31.html • CWE-476: NULL Pointer Dereference •