First published: Tue May 19 2020(Updated: )
In Wireshark 3.2.0 to 3.2.3, 3.0.0 to 3.0.10, and 2.6.0 to 2.6.16, the NFS dissector could crash. This was addressed in epan/dissectors/packet-nfs.c by preventing excessive recursion, such as for a cycle in the directory graph on a filesystem.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.6.0<=2.6.16 | |
Wireshark Wireshark | >=3.0.0<=3.0.10 | |
Wireshark Wireshark | >=3.2.0<=3.2.3 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
ubuntu/wireshark | <3.2.4-1 | 3.2.4-1 |
ubuntu/wireshark | <2.6.10-1~ubuntu18.04.0+ | 2.6.10-1~ubuntu18.04.0+ |
ubuntu/wireshark | <3.2.3-1ubuntu0.1~ | 3.2.3-1ubuntu0.1~ |
ubuntu/wireshark | <2.6.10-1~ubuntu14.04.0~ | 2.6.10-1~ubuntu14.04.0~ |
ubuntu/wireshark | <2.6.10-1~ubuntu16.04.0+ | 2.6.10-1~ubuntu16.04.0+ |
debian/wireshark | 2.6.20-0+deb10u4 2.6.20-0+deb10u8 3.4.10-0+deb11u1 4.0.11-1~deb12u1 4.2.2-1 4.2.2-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-13164.
The severity of CVE-2020-13164 is high with a CVSS score of 7.5.
The vulnerability occurs due to a crash in the NFS dissector when encountering excessive recursion, such as for a cycle in the directory graph on a filesystem.
Yes, the vulnerability was addressed in the following versions of Wireshark: 3.2.4-1, 2.6.10-1~ubuntu18.04.0+, 3.2.3-1ubuntu0.1~, 2.6.10-1~ubuntu14.04.0~, and 2.6.10-1~ubuntu16.04.0+.
More information about CVE-2020-13164 can be found at the following references: [Link 1](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476), [Link 2](https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e6e98eab8e5e0bbc982cfdc808f2469d7cab6c5a), [Link 3](https://www.wireshark.org/security/wnpa-sec-2020-08.html).