CVE Details for CVE: CVE-2019-9214
Summary
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.
Timestamps | |
---|---|
Last major update | 07-11-2023 - 03:13 |
Published | 28-02-2019 - 04:29 |
Last modified | 07-11-2023 - 03:13 |
References
- https://www.wireshark.org/security/wnpa-sec-2019-08.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15536
- http://www.securityfocus.com/bid/107203
- https://www.debian.org/security/2019/dsa-4416
- https://seclists.org/bugtraq/2019/Mar/35
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html
- https://usn.ubuntu.com/3986-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c557bb0910be271e49563756411a690a1bc53ce5
Vulnerable Configurations
-
cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.7:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.8:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.9:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.10:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.11:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.12:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.6.6:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CWE
CVSS
Base
5.0
Impact
2.9
Exploitability
10.0
Access
Vector | Complexity | Authentication |
---|---|---|
NETWORK | LOW | NONE |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | PARTIAL |
CVSS3
Base
7.5
Impact
3.6
Exploitability
3.9
Access
Attack Complexity | Attack vector | Privileges Required | Scope | User Interaction |
---|---|---|---|---|
LOW | NETWORK | NONE | UNCHANGED | NONE |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | HIGH |