CVE Details for CVE: CVE-2018-11356
Summary
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
Timestamps | |
---|---|
Last major update | 07-11-2023 - 02:51 |
Published | 22-05-2018 - 21:29 |
Last modified | 07-11-2023 - 02:51 |
References
- https://www.wireshark.org/security/wnpa-sec-2018-29.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
- http://www.securityfocus.com/bid/104308
- http://www.securitytracker.com/id/1041036
- https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
Vulnerable Configurations
-
cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.7:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.8:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.9:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.10:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.11:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.12:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.13:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.2.14:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
CWE
CVSS
Base
5.0
Impact
2.9
Exploitability
10.0
Access
Vector | Complexity | Authentication |
---|---|---|
NETWORK | LOW | NONE |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | PARTIAL |
CVSS3
Base
7.5
Impact
3.6
Exploitability
3.9
Access
Attack Complexity | Attack vector | Privileges Required | Scope | User Interaction |
---|---|---|---|---|
LOW | NETWORK | NONE | UNCHANGED | NONE |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | HIGH |