First published: Thu Jul 19 2018(Updated: )
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.2.0<=2.2.15 | |
Wireshark Wireshark | >=2.4.0<=2.4.7 | |
Wireshark Wireshark | >=2.6.0<=2.6.1 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2018-14368 vulnerability is considered to have a medium severity due to the infinite loop it can cause in Wireshark.
To fix CVE-2018-14368, upgrade Wireshark to version 2.6.2 or later, 2.4.8 or later, or 2.2.16 or later.
CVE-2018-14368 affects Wireshark versions 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15.
Yes, CVE-2018-14368 can affect users of Debian GNU/Linux 8.0 if they are using the vulnerable versions of Wireshark.
CVE-2018-14368 causes the Bazaar protocol dissector in Wireshark to go into an infinite loop, potentially leading to a denial of service.