First published: Mon Jul 31 2023(Updated: )
It was discovered that Wireshark did not properly handle certain NFS packages when certain configuration options were enabled. An attacker could possibly use this issue to cause Wireshark to crash, resulting in a denial of service. (CVE-2020-13164) It was discovered that Wireshark did not properly handle certain GVCP packages. An attacker could possibly use this issue to cause Wireshark to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-15466) It was discovered that Wireshark did not properly handle certain Kafka packages. An attacker could possibly use this issue to cause Wireshark to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-17498) It was discovered that Wireshark did not properly handle certain TCP packages containing an invalid 0xFFFF checksum. An attacker could possibly use this issue to cause Wireshark to crash, resulting in a denial of service. (CVE-2020-25862) It was discovered that Wireshark did not properly handle certain MIME packages containing invalid parts. An attacker could possibly use this issue to cause Wireshark to crash, resulting in a denial of service. (CVE-2020-25863)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/tshark | <3.2.3-1ubuntu0.1~esm1 | 3.2.3-1ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/wireshark | <3.2.3-1ubuntu0.1~esm1 | 3.2.3-1ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/wireshark-qt | <3.2.3-1ubuntu0.1~esm1 | 3.2.3-1ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/wireshark-common | <3.2.3-1ubuntu0.1~esm1 | 3.2.3-1ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/wireshark-gtk | <3.2.3-1ubuntu0.1~esm1 | 3.2.3-1ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libwireshark13 | <3.2.3-1ubuntu0.1~esm1 | 3.2.3-1ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/tshark | <2.6.10-1~ubuntu18.04.0+esm1 | 2.6.10-1~ubuntu18.04.0+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/wireshark-qt | <2.6.10-1~ubuntu18.04.0+esm1 | 2.6.10-1~ubuntu18.04.0+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/wireshark-gtk | <2.6.10-1~ubuntu18.04.0+esm1 | 2.6.10-1~ubuntu18.04.0+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/wireshark-common | <2.6.10-1~ubuntu18.04.0+esm1 | 2.6.10-1~ubuntu18.04.0+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libwireshark11 | <2.6.10-1~ubuntu18.04.0+esm1 | 2.6.10-1~ubuntu18.04.0+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/wireshark | <2.6.10-1~ubuntu18.04.0+esm1 | 2.6.10-1~ubuntu18.04.0+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/tshark | <2.6.10-1~ubuntu16.04.0+esm1 | 2.6.10-1~ubuntu16.04.0+esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/wireshark-qt | <2.6.10-1~ubuntu16.04.0+esm1 | 2.6.10-1~ubuntu16.04.0+esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/wireshark-gtk | <2.6.10-1~ubuntu16.04.0+esm1 | 2.6.10-1~ubuntu16.04.0+esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/wireshark-common | <2.6.10-1~ubuntu16.04.0+esm1 | 2.6.10-1~ubuntu16.04.0+esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libwireshark11 | <2.6.10-1~ubuntu16.04.0+esm1 | 2.6.10-1~ubuntu16.04.0+esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/wireshark | <2.6.10-1~ubuntu16.04.0+esm1 | 2.6.10-1~ubuntu16.04.0+esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/tshark | <2.6.10-1~ubuntu14.04.0~esm2 | 2.6.10-1~ubuntu14.04.0~esm2 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/wireshark-qt | <2.6.10-1~ubuntu14.04.0~esm2 | 2.6.10-1~ubuntu14.04.0~esm2 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/wireshark-gtk | <2.6.10-1~ubuntu14.04.0~esm2 | 2.6.10-1~ubuntu14.04.0~esm2 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/wireshark-common | <2.6.10-1~ubuntu14.04.0~esm2 | 2.6.10-1~ubuntu14.04.0~esm2 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libwireshark11 | <2.6.10-1~ubuntu14.04.0~esm2 | 2.6.10-1~ubuntu14.04.0~esm2 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/wireshark | <2.6.10-1~ubuntu14.04.0~esm2 | 2.6.10-1~ubuntu14.04.0~esm2 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this Wireshark vulnerability is CVE-2020-13164.
This vulnerability in Wireshark could allow an attacker to cause the application to crash, resulting in a denial of service.
The affected software for this Wireshark vulnerability includes tshark, wireshark, wireshark-qt, wireshark-common, wireshark-gtk, libwireshark13, libwireshark11.
The recommended remedy for this Wireshark vulnerability on Ubuntu 20.04 is to update to version 3.2.3-1ubuntu0.1~esm1.
You can find more information about this Wireshark vulnerability at the following links: - [CVE-2020-13164](https://ubuntu.com/security/CVE-2020-13164) - [CVE-2020-17498](https://ubuntu.com/security/CVE-2020-17498) - [CVE-2020-15466](https://ubuntu.com/security/CVE-2020-15466)