First published: Thu Feb 28 2019(Updated: )
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | 3.4.10-0+deb11u1 3.4.16-0+deb11u1 4.0.17-0+deb12u1 4.0.11-1~deb12u1 4.4.3-1 | |
Wireshark Wireshark | >=2.4.0<=2.4.12 | |
Wireshark Wireshark | >=2.6.0<=2.6.6 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9214 is considered to be a moderate severity vulnerability due to the potential for application crashes.
To fix CVE-2019-9214, upgrade to a fixed version of Wireshark such as 3.4.10-0+deb11u1 or later.
Versions of Wireshark from 2.4.0 to 2.4.12 and from 2.6.0 to 2.6.6 are affected by CVE-2019-9214.
CVE-2019-9214 can lead to application crashes due to a NULL pointer dereference in the RPCAP dissector.
Yes, patches addressing CVE-2019-9214 have been included in the updated versions of Wireshark.