Vulnerability Details : CVE-2017-6473
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.
Vulnerability category: Input validation
Products affected by CVE-2017-6473
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-6473
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-6473
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2017-6473
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-6473
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
13431 – Fuzzed K12 file causes invalid read in k12.cIssue Tracking;Patch;Vendor Advisory
-
http://www.debian.org/security/2017/dsa-3811
Debian -- Security Information -- DSA-3811-1 wiresharkThird Party Advisory
-
https://www.wireshark.org/security/wnpa-sec-2017-09.html
Wireshark · wnpa-sec-2017-09 · K12 file parser crashVendor Advisory
-
http://www.securityfocus.com/bid/96565
Wireshark 'k12.c' Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=7edc761a01cda8e1b37677f673985582330317d2
code.wireshark Code Review - wireshark.git/commitIssue Tracking;Patch;Vendor Advisory
Jump to