First published: Tue Apr 09 2019(Updated: )
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | 3.4.10-0+deb11u1 3.4.16-0+deb11u1 4.0.17-0+deb12u1 4.0.11-1~deb12u1 4.4.3-1 | |
Wireshark | >=2.4.0<=2.4.13 | |
Wireshark | >=2.6.0<=2.6.7 | |
Wireshark | =3.0.0 | |
Red Hat Fedora | =29 | |
Red Hat Fedora | =30 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10895 has a medium severity rating due to the possibility of a crash in the Wireshark application.
To fix CVE-2019-10895, update to Wireshark versions 3.4.10, 3.4.16, 4.0.17, 4.0.11, or 4.4.3, or to any above 2.4.13, 2.6.7, or 3.0.0.
CVE-2019-10895 affects multiple versions of Wireshark across various platforms including Debian, Ubuntu, Fedora, and openSUSE.
If exploited, CVE-2019-10895 could lead to an unexpected crash of the Wireshark application, potentially causing a denial of service.
Versions of Wireshark from 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0 are impacted by CVE-2019-10895.