Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-10895 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Wireshark Server applications / IDS/IPS systems, Firewalls and proxy servers Fedora Operating systems & Components / Operating system |
Vendor |
Wireshark.org Fedoraproject |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU33463
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-10895
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.
MitigationInstall update from vendor's website.
Vulnerable software versionsWireshark: 3.0.0
Fedora: 3.0.0 - 30
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html
https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html
https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
https://www.securityfocus.com/bid/107834
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2fbbde780e5d5d82e31dca656217daf278cf62bb
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=38680c4c69f9f4e0f39e29b66fe2b02d88eb629d
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=cab0cff6abdd7a5b5b0bfa4ee204eea951e129e9
https://lists.debian.org/debian-lts-announce/2019/05/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/
https://usn.ubuntu.com/3986-1/
https://www.wireshark.org/security/wnpa-sec-2019-09.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.