First published: Tue Oct 10 2017(Updated: )
In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.0.0<=2.0.15 | |
Wireshark Wireshark | >=2.2.0<=2.2.9 | |
Wireshark Wireshark | >=2.4.0<=2.4.1 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15191 has a medium severity rating due to the potential for application crashes.
To fix CVE-2017-15191, upgrade to Wireshark version 2.4.2 or higher, 2.2.10 or higher, or 2.0.16 or higher.
CVE-2017-15191 affects Wireshark versions 2.0.0 to 2.0.15, 2.2.0 to 2.2.9, and 2.4.0 to 2.4.1.
The DMP dissector in Wireshark is the component impacted by CVE-2017-15191.
CVE-2017-15191 is a denial-of-service vulnerability due to a potential crash in Wireshark.