First published: Tue Oct 06 2020(Updated: )
In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.6.0<=2.6.20 | |
Wireshark Wireshark | >=3.0.0<=3.0.13 | |
Wireshark Wireshark | >=3.2.0<=3.2.6 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Debian Debian Linux | =9.0 | |
Oracle Zfs Storage Appliance Firmware | =8.8 | |
Oracle Zfs Storage Appliance Firmware | ||
ubuntu/wireshark | <3.2.3-1ubuntu0.1~ | 3.2.3-1ubuntu0.1~ |
ubuntu/wireshark | <2.6.10-1~ubuntu14.04.0~ | 2.6.10-1~ubuntu14.04.0~ |
ubuntu/wireshark | <2.6.10-1~ubuntu16.04.0+ | 2.6.10-1~ubuntu16.04.0+ |
ubuntu/wireshark | <3.2.7-1 | 3.2.7-1 |
ubuntu/wireshark | <2.6.10-1~ubuntu18.04.0+ | 2.6.10-1~ubuntu18.04.0+ |
All of | ||
Oracle Zfs Storage Appliance Firmware | =8.8 | |
Oracle Zfs Storage Appliance Firmware | ||
debian/wireshark | 2.6.20-0+deb10u4 2.6.20-0+deb10u8 3.4.10-0+deb11u1 4.0.11-1~deb12u1 4.2.2-1 4.2.2-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25862 is a vulnerability in Wireshark versions 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20 that could cause the TCP dissector to crash.
CVE-2020-25862 has a severity rating of 7.5, which is considered high.
To fix CVE-2020-25862, update Wireshark to version 3.2.3-1ubuntu0.1~ or install the latest available version from the official Wireshark website.
You can find more information about CVE-2020-25862 in the following references: - [Wireshark GitLab Commit](https://gitlab.com/wireshark/wireshark/-/commit/7f3fe6164a68b76d9988c4253b24d43f498f1753) - [Wireshark GitLab Issue](https://gitlab.com/wireshark/wireshark/-/issues/16816) - [Wireshark Security Advisory](https://www.wireshark.org/security/wnpa-sec-2020-12.html)
The Common Weakness Enumeration (CWE) for CVE-2020-25862 is CWE-354, which refers to a Improper Handling of Non-Null Terminated String.