First published: Thu Dec 05 2019(Updated: )
In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.6.0<=2.6.12 | |
Wireshark Wireshark | >=3.0.0<=3.0.6 | |
openSUSE Leap | =15.1 | |
Oracle Solaris | =11 | |
Oracle ZFS Storage Appliance | =8.8 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Wireshark vulnerability is CVE-2019-19553.
Wireshark versions 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12 are affected by this vulnerability.
The vulnerability manifests as a crash in the CMS dissector in Wireshark.
The severity of CVE-2019-19553 is high with a CVSS score of 7.5.
The vulnerability was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.