CVE-2017-9351

NameCVE-2017-9351
DescriptionIn Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs864058

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wireshark (PTS)jessie1.12.1+g01b65bf-4+deb8u11vulnerable
jessie (security)1.12.1+g01b65bf-4+deb8u14vulnerable
stretch2.2.6+g32dac6a-2+deb9u2vulnerable
stretch (security)2.2.6+g32dac6a-2+deb9u3vulnerable
buster, sid2.4.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wiresharksource(unstable)2.2.7-1low864058

Notes

[stretch] - wireshark <no-dsa> (Minor issue)
[jessie] - wireshark <no-dsa> (Minor issue)
[wheezy] - wireshark <no-dsa> (Minor issue)
https://www.wireshark.org/security/wnpa-sec-2017-24.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609

Search for package or bug name: Reporting problems