Wireshark is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets.
Attackers can exploit this issue to crash the affected application, resulting in denial-of-service conditions.
Wireshark 2.2.0 through 2.2.5 and 2.0.0 through 2.0.11 are vulnerable.
Information
Wireshark Wireshark 2.2.4
Wireshark Wireshark 2.2.3
Wireshark Wireshark 2.2.2
Wireshark Wireshark 2.2.1
Wireshark Wireshark 2.2
Wireshark Wireshark 2.0.11
Wireshark Wireshark 2.0.10
Wireshark Wireshark 2.0.9
Wireshark Wireshark 2.0.8
Wireshark Wireshark 2.0.7
Wireshark Wireshark 2.0.6
Wireshark Wireshark 2.0.5
Wireshark Wireshark 2.0.3
Wireshark Wireshark 2.0.2
Wireshark Wireshark 2.0.4
Wireshark Wireshark 2.0.1
Wireshark Wireshark 2.0.0
Wireshark Wireshark 2.0.12
Exploit
A sample packet trace file is available in the Wireshark bug report. Please see the references for more information.
References:
- Fuzzed PCAP causes invalid read in strutil.c (called from packet-imap.c) (Wireshark)
- Wireshark Homepage (Wireshark)
- wnpa-sec-2017-12 · IMAP dissector crash (Wireshark)