First published: Tue Jan 08 2019(Updated: )
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | 2.6.20-0+deb10u4 2.6.20-0+deb10u7 3.4.10-0+deb11u1 4.0.11-1~deb12u1 4.2.0-1 | |
Wireshark Wireshark | >=2.4.0<=2.4.11 | |
Wireshark Wireshark | >=2.6.0<=2.6.5 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5717 has a medium severity rating due to the potential for denial of service through a crash of the application.
To fix CVE-2019-5717, update Wireshark to version 2.6.20 or later, or 3.4.10 or later, or apply the patch provided in the remediation notes.
CVE-2019-5717 affects Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11.
The impact of CVE-2019-5717 on users of Wireshark is that the application may crash when processing certain packets.
CVE-2019-5717 is not specific to any operating system but affects the Wireshark application across multiple platforms.