First published: Thu Jul 19 2018(Updated: )
In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.4.0<=2.4.7 | |
Wireshark Wireshark | >=2.6.0<=2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14367 has a medium severity rating due to the potential for crashing the application.
To fix CVE-2018-14367, upgrade Wireshark to version 2.4.8 or later for the 2.4.x branch or 2.6.2 or later for the 2.6.x branch.
The affected versions of Wireshark for CVE-2018-14367 range from 2.4.0 to 2.4.7 and 2.6.0 to 2.6.1.
CVE-2018-14367 exploits a flaw in the CoAP protocol dissector that could lead to application crashes.
While CVE-2018-14367 is specific to certain Wireshark versions, it highlights general security concerns related to improper handling of protocol dissectors.