First published: Thu Jul 19 2018(Updated: )
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.2.0<=2.2.15 | |
Wireshark Wireshark | >=2.4.0<=2.4.7 | |
Wireshark Wireshark | >=2.6.0<=2.6.1 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14341 has a medium severity rating as it may lead to a denial of service due to an infinite loop.
To fix CVE-2018-14341, upgrade Wireshark to the latest version that is not affected, specifically versions later than 2.6.1, 2.4.7, or 2.2.15.
Wireshark versions 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15 are vulnerable to CVE-2018-14341.
Yes, CVE-2018-14341 affects the Debian Linux 8.0 distribution if it includes vulnerable versions of Wireshark.
CVE-2018-14341 involves a large or infinite loop in the DICOM dissector, which can result in denial of service.