CERT-In Vulnerability Note
CIVN-2024-0002
Denial of Service vulnerability in Wireshark
Original Issue Date:January 05, 2024
Severity Rating: MEDIUM
Software Affected
- Wireshark versions 3.6.0 to 3.6.19, 4.0.0 to 4.0.11 and 4.2.0
Overview
Multiple Vulnerabilities have been reported in Wireshark, which could allow an attacker to cause denial of service conditions on the targeted system.
Description
These vulnerabilities exist in Wireshark due to flaws in the GVCP dissector, IEEE 1609.2 dissector, HTTP3 dissector, Zigbee TLV dissector, and DOCSIS dissector. Attackers could exploit these vulnerabilities by sending specially crafted traffic to the application.
Successful exploitation may lead to Wireshark crashing or consuming excessive CPU resources, causing denial of service conditions on the system targeted.
Solution
Upgrade to Wireshark 4.2.1, 4.0.12, 3.6.20, or later versions as recommended in the vendor advisories:
https://www.wireshark.org/security/wnpa-sec-2024-01.html
https://www.wireshark.org/security/wnpa-sec-2024-02.html
https://www.wireshark.org/security/wnpa-sec-2024-03.html
https://www.wireshark.org/security/wnpa-sec-2024-04.html
https://www.wireshark.org/security/wnpa-sec-2024-05.html
Vendor Information
Wireshark
https://www.wireshark.org/
References
Wireshark
https://www.wireshark.org/security/wnpa-sec-2024-01.html
https://www.wireshark.org/security/wnpa-sec-2024-02.html
https://www.wireshark.org/security/wnpa-sec-2024-03.html
https://www.wireshark.org/security/wnpa-sec-2024-04.html
https://www.wireshark.org/security/wnpa-sec-2024-05.html
CVE Name
CVE-2024-0208
CVE-2024-0209
CVE-2024-0207
CVE-2024-0210
CVE-2024-0211
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-22902657
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|