CVE-2017-17935
https://notcve.org/view.php?id=CVE-2017-17935
The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line. La función File_read_line en epan/wslua/wslua_file.c en Wireshark hasta la versión 2.2.11 no elimina correctamente caracteres "\n", lo que permite que atacantes remotos provoquen una denegación de servicio (subdesbordamiento de búfer y cierre inesperado de la aplicación) mediante un paquete manipulado que da lugar al intento de procesamiento de una línea vacía. • http://www.securityfocus.com/bid/102311 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14295 https://code.wireshark.org/review/#/c/24997 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=137ab7d5681486c6d6cc8faac4300b7cd4ec0cf1 https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html • CWE-125: Out-of-bounds Read •
CVE-2017-17084
https://notcve.org/view.php?id=CVE-2017-17084
In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length. En Wireshark 2.4.0 a 2.4.2 y 2.2.0 a 2.2.10, el disector IWARP_MPA podía cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-iwarp-mpa.c validando la longitud de una ULPDU. • http://www.securityfocus.com/bid/102030 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8502fe94ef9e431860921507e1a351c5e3f5c634 https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html https://www.debian.org/security/2017/dsa-4060 https://www.wireshark.org/security/wnpa-sec-2017-47.html • CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2017-17085 – Wireshark 2.4.0 < 2.4.2 / 2.2.0 < 2.2.10 - CIP Safety Dissector Crash
https://notcve.org/view.php?id=CVE-2017-17085
In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length. En Wireshark 2.4.0 a 2.4.2 y 2.2.0 a 2.2.10, el disector CIP Safety podía cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-cipsafety.c validando la longitud del paquete. Wireshark versions 2.4.0 through 2.4.2 and 2.2.0 through 2.2.10 suffer from a crash issue in the CIP Safety dissector. • https://www.exploit-db.com/exploits/43233 http://www.securityfocus.com/bid/102071 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f5939debe96e3c3953c6020818f1fbb80eb83ce8 https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html https://www.debian.org/security/2017/dsa-4060 https://www.wireshark.org/security/wnpa-sec-2017-49.html • CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2017-17083
https://notcve.org/view.php?id=CVE-2017-17083
In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. En Wireshark 2.4.0 a 2.4.2 y 2.2.0 a 2.2.10, el disector NetBIOS podía cerrarse inesperadamente. Esto se solucionó en epan/dissectors/packet-netbios.c asegurando que las operaciones de escritura estaban limitadas al principio de un búfer. • http://www.securityfocus.com/bid/102029 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14249 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=79768d63d14fbce6bf7fb4d4a1c86be0c5205eb3 https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html https://www.debian.org/security/2017/dsa-4060 https://www.wireshark.org/security/wnpa-sec-2017-48.html • CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2017-15189
https://notcve.org/view.php?id=CVE-2017-15189
In Wireshark 2.4.0 to 2.4.1, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by adding decrements. En Wireshark, desde la versión 2.4.0 hasta la 2.4.1, el disector DOCSIS podría entrar en un bucle infinito. Esto se trató en plugins/docsis/packet-docsis.c añadiendo decrementos. • http://www.securityfocus.com/bid/101228 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14080 https://code.wireshark.org/review/23663 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=625bab309d9dd21db2d8ae2aa3511810d32842a8 https://www.wireshark.org/security/wnpa-sec-2017-46.html • CWE-772: Missing Release of Resource after Effective Lifetime •