First published: Tue Oct 06 2020(Updated: )
In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=3.0.0<=3.0.13 | |
Wireshark Wireshark | >=3.2.0<=3.2.6 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Oracle ZFS Storage Appliance Kit | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25866 is a vulnerability in Wireshark versions 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13 where the BLIP protocol dissector has a NULL pointer dereference.
CVE-2020-25866 has a severity rating of 7.5 (high).
Wireshark versions 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13 are affected by CVE-2020-25866.
CVE-2020-25866 can be fixed by updating Wireshark to a version that includes the fix, such as version 3.0.14 or 3.2.7.
More information about CVE-2020-25866 can be found at the following references: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html), [Link 3](https://gitlab.com/wireshark/wireshark/-/commit/4a948427100b6c109f4ec7b4361f0d2aec5e5c3f).