Vulnerability Details : CVE-2018-5334
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.
Vulnerability category: Overflow
Products affected by CVE-2018-5334
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-5334
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-5334
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2018-5334
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-5334
-
http://www.securityfocus.com/bid/102499
Wireshark IxVeriWave File Parser Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14297
14297 – There are two missing bounds check for m_ptr array in get_signature_ts function in wiretap/vwr.c fileIssue Tracking;Vendor Advisory
-
https://www.debian.org/security/2018/dsa-4101
Debian -- Security Information -- DSA-4101-1 wiresharkThird Party Advisory
-
https://www.wireshark.org/security/wnpa-sec-2018-03.html
Wireshark · wnpa-sec-2018-03 · IxVeriWave file parser crashVendor Advisory
-
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=dc308c05ba0673460fe80873b22d296880ee996d
code.wireshark Code Review - wireshark.git/commitPatch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2018/01/msg00032.html
[SECURITY] [DLA 1258-1] wireshark security updateMailing List;Third Party Advisory
Jump to