First published: Thu Nov 29 2018(Updated: )
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the LBMPDM dissector could crash. In addition, a remote attacker could write arbitrary data to any memory locations before the packet-scoped memory. This was addressed in epan/dissectors/packet-lbmpdm.c by disallowing certain negative values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | 2.6.20-0+deb10u4 2.6.20-0+deb10u7 3.4.10-0+deb11u1 4.0.6-1~deb12u1 4.0.10-1 | |
Wireshark Wireshark | >=2.4.0<=2.4.10 | |
Wireshark Wireshark | >=2.6.0<=2.6.4 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19623 has been classified as a high-severity vulnerability due to the potential for remote code execution and application crashes.
To mitigate CVE-2018-19623, update Wireshark to a version higher than 2.6.4 or 2.4.10.
CVE-2018-19623 affects Wireshark versions from 2.6.0 to 2.6.4 and from 2.4.0 to 2.4.10.
Yes, CVE-2018-19623 could allow a remote attacker to write arbitrary data to memory, which may lead to code execution.
CVE-2018-19623 affects the LBMPDM dissector component of Wireshark.