CVE-2013-2488

NameCVE-2013-2488
DescriptionThe DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2644-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wireshark (PTS)bullseye3.4.10-0+deb11u1fixed
bullseye (security)3.4.16-0+deb11u1fixed
bookworm, bookworm (security)4.0.11-1~deb12u1fixed
sid, trixie4.4.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wiresharksourcesqueeze1.2.11-6+squeeze10DSA-2644-1
wiresharksourcewheezy1.8.2-5wheezy1
wiresharksource(unstable)1.8.2-5

Notes

http://www.wireshark.org/security/wnpa-sec-2013-22.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8380
Versions affected: 1.8.0 to 1.8.X, 1.6.0 to 1.6.X

Search for package or bug name: Reporting problems