First published: Fri Oct 12 2018(Updated: )
In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | 2.6.20-0+deb10u4 2.6.20-0+deb10u7 3.4.10-0+deb11u1 4.0.6-1~deb12u1 4.0.10-1 | |
Wireshark Wireshark | >=2.4.0<=2.4.9 | |
Wireshark Wireshark | >=2.6.0<=2.6.3 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18227 has a medium severity rating due to the potential for the Wireshark application to crash.
To fix CVE-2018-18227, upgrade to Wireshark versions 2.6.4 or later, 2.4.10 or later, or any other version that includes the security patch.
Wireshark versions 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9 are vulnerable to CVE-2018-18227.
The vulnerability in CVE-2018-18227 is caused by improper handling of NULL return values in the MS-WSP protocol dissector.
Yes, CVE-2018-18227 affects Debian Linux systems running vulnerable versions of Wireshark.