CVE-2013-2488

NameCVE-2013-2488
DescriptionThe DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2644-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wireshark (PTS)wheezy1.8.2-5wheezy18fixed
wheezy (security)1.12.1+g01b65bf-4+deb8u6~deb7u3fixed
jessie1.12.1+g01b65bf-4+deb8u6fixed
jessie (security)1.12.1+g01b65bf-4+deb8u8fixed
stretch, sid2.2.0~rc1+g438c022-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wiresharksource(unstable)1.8.2-5medium
wiresharksourcesqueeze1.2.11-6+squeeze10mediumDSA-2644-1
wiresharksourcewheezy1.8.2-5wheezy1medium

Notes

http://www.wireshark.org/security/wnpa-sec-2013-22.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8380
Versions affected: 1.8.0 to 1.8.X, 1.6.0 to 1.6.X

Search for package or bug name: Reporting problems