First published: Fri Jun 02 2017(Updated: )
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.0.0<=2.0.12 | |
Wireshark Wireshark | >=2.2.0<=2.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9351 is classified as a medium severity vulnerability.
To fix CVE-2017-9351, upgrade Wireshark to version 2.2.7 or later if you are using the 2.2.x series, or to version 2.0.13 or later if you are using the 2.0.x series.
Wireshark versions from 2.0.0 to 2.0.12 and from 2.2.0 to 2.2.6 are affected by CVE-2017-9351.
CVE-2017-9351 is a buffer overflow vulnerability in the DHCP dissector of Wireshark.
Users of affected versions of Wireshark who analyze DHCP packets could be impacted by CVE-2017-9351.