ID CVE-2017-17085
Summary In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.
References
Vulnerable Configurations
  • Wireshark 2.2.0
    cpe:2.3:a:wireshark:wireshark:2.2.0
  • Wireshark 2.2.1
    cpe:2.3:a:wireshark:wireshark:2.2.1
  • Wireshark 2.2.2
    cpe:2.3:a:wireshark:wireshark:2.2.2
  • Wireshark 2.2.3
    cpe:2.3:a:wireshark:wireshark:2.2.3
  • Wireshark 2.2.4
    cpe:2.3:a:wireshark:wireshark:2.2.4
  • Wireshark 2.2.5
    cpe:2.3:a:wireshark:wireshark:2.2.5
  • Wireshark 2.2.6
    cpe:2.3:a:wireshark:wireshark:2.2.6
  • Wireshark 2.2.7
    cpe:2.3:a:wireshark:wireshark:2.2.7
  • Wireshark 2.2.8
    cpe:2.3:a:wireshark:wireshark:2.2.8
  • Wireshark 2.2.9
    cpe:2.3:a:wireshark:wireshark:2.2.9
  • Wireshark 2.2.10
    cpe:2.3:a:wireshark:wireshark:2.2.10
  • Wireshark 2.4.0
    cpe:2.3:a:wireshark:wireshark:2.4.0
  • Wireshark 2.4.1
    cpe:2.3:a:wireshark:wireshark:2.4.1
  • Wireshark 2.4.2
    cpe:2.3:a:wireshark:wireshark:2.4.2
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-754
CAPEC
exploit-db via4
description Wireshark 2.4.0 - 2.4.2 / 2.2.0 - 2.2.10 - CIP Safety Dissector Crash. CVE-2017-17085. Dos exploit for Multiple platform. Tags: Denial of Service (DoS)
file exploits/multiple/dos/43233.txt
id EDB-ID:43233
last seen 2017-12-07
modified 2017-12-07
platform multiple
port
published 2017-12-07
reporter Exploit-DB
source https://www.exploit-db.com/download/43233/
title Wireshark 2.4.0 - 2.4.2 / 2.2.0 - 2.2.10 - CIP Safety Dissector Crash
type dos
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-1337.NASL
    description This update for wireshark to version 2.2.11 fixes the following issues : Minor vulnerabilities that could be used to trigger dissector crashes by making Wireshark read specially crafted packages from the network or capture files (boo#1070727) : - CVE-2017-17084: IWARP_MPA dissector crash (wnpa-sec-2017-47) - CVE-2017-17083: NetBIOS dissector crash (wnpa-sec-2017-48) - CVE-2017-17085: CIP Safety dissector crash (wnpa-sec-2017-49) This update also fixes further bugs and updates protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.11.html
    last seen 2018-09-01
    modified 2018-01-26
    plugin id 105228
    published 2017-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105228
    title openSUSE Security Update : wireshark (openSUSE-2017-1337)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-3997279E65.NASL
    description New upstream version 2.4.3. It contains fixes for CVE-2017-17084, CVE-2017-17083 and CVE-2017-17085. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-02-01
    plugin id 105858
    published 2018-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105858
    title Fedora 27 : 1:wireshark (2017-3997279e65)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1226.NASL
    description It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the execution of arbitrary code. For Debian 7 'Wheezy', these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6~deb7u8. We recommend that you upgrade your wireshark packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-02
    modified 2018-07-09
    plugin id 105495
    published 2018-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105495
    title Debian DLA-1226-1 : wireshark security update
  • NASL family Windows
    NASL id WIRESHARK_2_4_3.NASL
    description The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.11 or 2.4.x prior to 2.4.3. It is, therefore, affected by denial of service vulnerabilities in the IWARP_MPA, NetBIOS, and CIP Safety dissectors. An unauthenticated, remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2018-09-01
    modified 2018-08-07
    plugin id 105007
    published 2017-12-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105007
    title Wireshark 2.2.x < 2.2.11 / 2.4.x < 2.4.3 DoS Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_WIRESHARK_2_4_3.NASL
    description The version of Wireshark installed on the remote MacOS/MacOSX host is 2.2.x prior to 2.2.11 or 2.4.x prior to 2.4.3. It is, therefore, affected by denial of service vulnerabilities in the IWARP_MPA, NetBIOS, and CIP Safety dissectors. An unauthenticated, remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2018-09-02
    modified 2018-07-14
    plugin id 105008
    published 2017-12-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105008
    title Wireshark 2.2.x < 2.2.11 / 2.4.x < 2.4.3 DoS Vulnerabilities (MacOS)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-3436-1.NASL
    description This update for wireshark fixes the following issues : - CVE-2017-17083: NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. (bsc#1070727) - CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length. (bsc#1070727) - CVE-2017-17085: the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length. (bsc#1070727) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-12-02
    modified 2018-11-30
    plugin id 105481
    published 2017-12-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105481
    title SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2017:3436-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_4B228E6922E14019AFD08AA716D0EC0B.NASL
    description wireshark developers reports : wnpa-sec-2017-47: The IWARP_MPA dissector could crash. (CVE-2017-17084) wnpa-sec-2017-48: The NetBIOS dissector could crash. Discovered by Kamil Frankowicz. (CVE-2017-17083) wnpa-sec-2017-49: The CIP Safety dissector could crash. (CVE-2017-17085)
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 105140
    published 2017-12-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105140
    title FreeBSD : wireshark -- multiple security issues (4b228e69-22e1-4019-afd0-8aa716d0ec0b)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4060.NASL
    description It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the execution of arbitrary code.
    last seen 2018-11-14
    modified 2018-11-13
    plugin id 105121
    published 2017-12-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105121
    title Debian DSA-4060-1 : wireshark - security update
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0054-1.NASL
    description This update for wireshark to version 2.2.11 fixes several issues. These security issues were fixed : - CVE-2017-13767: The MSDP dissector could have gone into an infinite loop. This was addressed by adding length validation (bsc#1056248) - CVE-2017-13766: The Profinet I/O dissector could have crash with an out-of-bounds write. This was addressed by adding string validation (bsc#1056249) - CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application crash. This was addressed by adding length validation (bsc#1056251) - CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote attackers to cause a denial of service (stack exhaustion) in the dissect_IODWriteReq function (bsc#1045341) - CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP dissector (bsc#1044417) - CVE-2017-15192: The BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level. (bsc#1062645) - CVE-2017-15193: The MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach. (bsc#1062645) - CVE-2017-15191: The DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645) - CVE-2017-17083: NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. (bsc#1070727) - CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length. (bsc#1070727) - CVE-2017-17085: the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length. (bsc#1070727) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-12-02
    modified 2018-12-01
    plugin id 105720
    published 2018-01-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105720
    title SUSE SLES11 Security Update : wireshark (SUSE-SU-2018:0054-1)
refmap via4
bid 102071
confirm
debian DSA-4060
mlist [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
Last major update 01-12-2017 - 03:29
Published 01-12-2017 - 03:29
Last modified 03-02-2018 - 21:29
Back to Top