First published: Thu Feb 28 2019(Updated: )
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | 3.4.10-0+deb11u1 3.4.16-0+deb11u1 4.0.17-0+deb12u1 4.0.11-1~deb12u1 4.4.3-1 | |
Wireshark Wireshark | >=2.4.0<=2.4.12 | |
Wireshark Wireshark | >=2.6.0<=2.6.6 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9209 is classified as a moderate severity vulnerability due to its potential to crash the Wireshark application.
To fix CVE-2019-9209, update to Wireshark versions 3.4.10, 3.4.16, 4.0.17, 4.0.11, or 4.4.3.
Versions of Wireshark from 2.4.0 to 2.4.12 and from 2.6.0 to 2.6.6 are affected by CVE-2019-9209.
CVE-2019-9209 can cause the Wireshark application to crash when processing certain ASN.1 BER data.
CVE-2019-9209 affects Wireshark on various operating systems including Debian and Ubuntu.