ID CVE-2013-4927
Summary Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
References
Vulnerable Configurations
  • cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 19-09-2017 - 01:36)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
oval via4
accepted 2013-09-09T04:02:33.273-04:00
class vulnerability
contributors
name Shane Shaffer
organization G2, Inc.
definition_extensions
comment Wireshark is installed on the system.
oval oval:org.mitre.oval:def:6589
description Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
family windows
id oval:org.mitre.oval:def:17636
status accepted
submitted 2013-07-30T13:45:45.734-04:00
title Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1
version 5
redhat via4
advisories
rhsa
id RHSA-2014:0341
rpms
  • wireshark-0:1.8.10-4.el6
  • wireshark-devel-0:1.8.10-4.el6
  • wireshark-gnome-0:1.8.10-4.el6
  • wireshark-0:1.0.15-6.el5_10
  • wireshark-gnome-0:1.0.15-6.el5_10
refmap via4
confirm
gentoo GLSA-201308-05
secunia
  • 54296
  • 54371
  • 54425
suse
  • openSUSE-SU-2013:1295
  • openSUSE-SU-2013:1300
Last major update 19-09-2017 - 01:36
Published 30-07-2013 - 00:56
Back to Top