ID CVE-2017-15192
Summary In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.
References
Vulnerable Configurations
  • Wireshark 2.2.0
    cpe:2.3:a:wireshark:wireshark:2.2.0
  • Wireshark 2.2.1
    cpe:2.3:a:wireshark:wireshark:2.2.1
  • Wireshark 2.2.2
    cpe:2.3:a:wireshark:wireshark:2.2.2
  • Wireshark 2.2.3
    cpe:2.3:a:wireshark:wireshark:2.2.3
  • Wireshark 2.2.4
    cpe:2.3:a:wireshark:wireshark:2.2.4
  • Wireshark 2.2.5
    cpe:2.3:a:wireshark:wireshark:2.2.5
  • Wireshark 2.2.6
    cpe:2.3:a:wireshark:wireshark:2.2.6
  • Wireshark 2.2.7
    cpe:2.3:a:wireshark:wireshark:2.2.7
  • Wireshark 2.2.8
    cpe:2.3:a:wireshark:wireshark:2.2.8
  • Wireshark 2.2.9
    cpe:2.3:a:wireshark:wireshark:2.2.9
  • Wireshark 2.4.0
    cpe:2.3:a:wireshark:wireshark:2.4.0
  • Wireshark 2.4.1
    cpe:2.3:a:wireshark:wireshark:2.4.1
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-399
CAPEC
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-9FD430DBA0.NASL
    description New version 2.4.2, fixes CVE-2017-15189, CVE-2017-15190, CVE-2017-15191, CVE-2017-15192, CVE-2017-15193, CVE-2017-13764, CVE-2017-13765, CVE-2017-13766, CVE-2017-13767 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-02-02
    plugin id 105941
    published 2018-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105941
    title Fedora 27 : 1:wireshark (2017-9fd430dba0)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_WIRESHARK_2_2_10.NASL
    description The version of Wireshark installed on the remote MacOS(X) host is 2.2.x prior to 2.2.10. It is, therefore, affected by multiple denial of service vulnerabilities in the DMP, BT ATT and MBIM dissectors. An unauthenticated, remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 103982
    published 2017-10-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=103982
    title Wireshark 2.2.x < 2.2.10 Multiple DoS (MacOS)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-2860-1.NASL
    description This update for wireshark fixes the following issues: Wireshark was updated to 2.2.10, fixing security issues and bugs : - CVE-2017-15191: DMP dissector crash (wnpa-sec-2017-44) - CVE-2017-15192: BT ATT dissector crash (wnpa-sec-2017-42) - CVE-2017-15193: MBIM dissector crash (wnpa-sec-2017-43) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 104210
    published 2017-10-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=104210
    title SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2017:2860-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0054-1.NASL
    description This update for wireshark to version 2.2.11 fixes several issues. These security issues were fixed : - CVE-2017-13767: The MSDP dissector could have gone into an infinite loop. This was addressed by adding length validation (bsc#1056248) - CVE-2017-13766: The Profinet I/O dissector could have crash with an out-of-bounds write. This was addressed by adding string validation (bsc#1056249) - CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application crash. This was addressed by adding length validation (bsc#1056251) - CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote attackers to cause a denial of service (stack exhaustion) in the dissect_IODWriteReq function (bsc#1045341) - CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP dissector (bsc#1044417) - CVE-2017-15192: The BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level. (bsc#1062645) - CVE-2017-15193: The MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach. (bsc#1062645) - CVE-2017-15191: The DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645) - CVE-2017-17083: NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. (bsc#1070727) - CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length. (bsc#1070727) - CVE-2017-17085: the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length. (bsc#1070727) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 105720
    published 2018-01-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105720
    title SUSE SLES11 Security Update : wireshark (SUSE-SU-2018:0054-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-1158.NASL
    description This update for wireshark to version 2.2.10 fixes multiple minor security issues. These vulnerabilities that could be used to trigger dissector crashes or infinite loops by making Wireshark read specially crafted packages from the network or a capture file : - CVE-2017-15192: BT ATT dissector crash - CVE-2017-15193: MBIM dissector crash - CVE-2017-15191: DMP dissector crash
    last seen 2019-02-21
    modified 2018-01-26
    plugin id 104073
    published 2017-10-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=104073
    title openSUSE Security Update : wireshark (openSUSE-2017-1158)
  • NASL family Windows
    NASL id WIRESHARK_2_2_10.NASL
    description The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.10. It is, therefore, affected by multiple denial of service vulnerabilities in the DMP, BT ATT and MBIM dissectors. An unauthenticated, remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-08-07
    plugin id 103985
    published 2017-10-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=103985
    title Wireshark 2.2.x < 2.2.10 Multiple DoS
  • NASL family Windows
    NASL id WIRESHARK_2_4_2.NASL
    description The version of Wireshark installed on the remote Windows host is 2.4.x prior to 2.4.2. It is, therefore, affected by multiple denial of service vulnerabilities in the DOCSIS, RTSP, DMP, BT ATT and MBIM dissectors. An unauthenticated, remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-08-07
    plugin id 103986
    published 2017-10-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=103986
    title Wireshark 2.4.x < 2.4.2 Multiple DoS
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_4684A426774D4390AA19B8DD481C4C94.NASL
    description wireshark developers reports : In Wireshark 2.4.0 to 2.4.1, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by adding decrements. In Wireshark 2.4.0 to 2.4.1, the RTSP dissector could crash. This was addressed in epan/dissectors/packet-rtsp.c by correcting the scope of a variable. In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length. In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level. In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach.
    last seen 2019-02-21
    modified 2018-12-19
    plugin id 104265
    published 2017-10-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=104265
    title FreeBSD : wireshark -- multiple security issues (4684a426-774d-4390-aa19-b8dd481c4c94)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_WIRESHARK_2_4_2.NASL
    description The version of Wireshark installed on the remote MacOS/MacOSX host is 2.4.x prior to 2.4.2. It is, therefore, affected by multiple denial of service vulnerabilities in the DOCSIS, RTSP, DMP, BT ATT and MBIM dissectors. An unauthenticated, remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 103983
    published 2017-10-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=103983
    title Wireshark 2.4.x < 2.4.2 Multiple DoS (MacOS)
refmap via4
bid 101235
confirm
Last major update 10-10-2017 - 17:29
Published 10-10-2017 - 17:29
Last modified 25-10-2017 - 08:04
Back to Top