First published: Fri Apr 10 2020(Updated: )
In Wireshark 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15, the BACapp dissector could crash. This was addressed in epan/dissectors/packet-bacapp.c by limiting the amount of recursion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.6.0<=2.6.15 | |
Wireshark Wireshark | >=3.0.0<=3.0.9 | |
Wireshark Wireshark | >=3.2.0<=3.2.2 | |
Debian GNU/Linux | =9.0 | |
openSUSE | =15.1 | |
openSUSE | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11647 has been classified as a high severity vulnerability due to its potential to cause application crashes.
To fix CVE-2020-11647, upgrade Wireshark to version 3.2.3 or later, or 3.0.10 or later, or 2.6.16 or later.
CVE-2020-11647 affects Wireshark versions 2.6.0 through 2.6.15, 3.0.0 through 3.0.9, and 3.2.0 through 3.2.2.
CVE-2020-11647 represents a denial of service (DoS) vulnerability caused by excessive recursion in the BACapp dissector.
If you are using one of the affected versions of Wireshark, your system may be impacted by CVE-2020-11647.