In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
Link | Tags |
---|---|
https://www.debian.org/security/2017/dsa-4060 | third party advisory vendor advisory |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f5939debe96e3c3953c6020818f1fbb80eb83ce8 | |
https://www.exploit-db.com/exploits/43233/ | exploit |
https://www.wireshark.org/security/wnpa-sec-2017-49.html | vendor advisory |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250 | vendor advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html | mailing list |
http://www.securityfocus.com/bid/102071 | third party advisory vdb entry |