CVE Details for CVE: CVE-2019-9209
Summary
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.
Timestamps | |
---|---|
Last major update | 07-11-2023 - 03:13 |
Published | 28-02-2019 - 04:29 |
Last modified | 07-11-2023 - 03:13 |
References
- https://www.wireshark.org/security/wnpa-sec-2019-06.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
- http://www.securityfocus.com/bid/107203
- https://www.debian.org/security/2019/dsa-4416
- https://seclists.org/bugtraq/2019/Mar/35
- https://lists.debian.org/debian-lts-announce/2019/03/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html
- https://usn.ubuntu.com/3986-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f8fbe9f934d65b2694fa74622e5eb2e1dc8cd20b
Vulnerable Configurations
-
cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.7:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.8:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.9:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.10:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.11:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.12:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.6:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
-
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
-
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
-
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
-
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
CWE
CVSS
Base
4.3
Impact
2.9
Exploitability
8.6
Access
Vector | Complexity | Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | PARTIAL |
CVSS3
Base
5.5
Impact
3.6
Exploitability
1.8
Access
Attack Complexity | Attack vector | Privileges Required | Scope | User Interaction |
---|---|---|---|---|
LOW | LOCAL | NONE | UNCHANGED | REQUIRED |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | HIGH |