First published: Tue May 22 2018(Updated: )
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.2.0<=2.2.14 | |
Wireshark Wireshark | >=2.4.0<=2.4.6 | |
Wireshark Wireshark | =2.6.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11357 is classified as a medium severity vulnerability that can lead to excessive memory consumption.
To fix CVE-2018-11357, upgrade Wireshark to a version later than 2.6.0 or 2.4.6 or 2.2.14.
Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 are affected by CVE-2018-11357.
CVE-2018-11357 is a memory consumption vulnerability found in the LTP dissector and other dissectors of Wireshark.
Yes, CVE-2018-11357 may also be present in Debian GNU/Linux 8.0 if it includes vulnerable versions of Wireshark.