ID CVE-2018-18227
Summary In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.
References
Vulnerable Configurations
CVSS
Base: None
Impact:
Exploitability:
nessus via4
  • NASL family Windows
    NASL id WIRESHARK_2_6_4.NASL
    description The version of Wireshark installed on the remote Windows host is 2.6.x prior to 2.6.4. It is, therefore, affected by multiple vulnerabilities.
    last seen 2018-10-19
    modified 2018-10-18
    plugin id 118207
    published 2018-10-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118207
    title Wireshark 2.6.x < 2.6.4 Multiple Vulnerabilities
  • NASL family Windows
    NASL id WIRESHARK_2_4_10.NASL
    description The version of Wireshark installed on the remote Windows host is 2.4.x prior to 2.4.10. It is, therefore, affected by multiple vulnerabilities.
    last seen 2018-10-19
    modified 2018-10-18
    plugin id 118206
    published 2018-10-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118206
    title Wireshark 2.4.x < 2.4.10 Multiple Vulnerabilities
refmap via4
bid 105583
misc
Last major update 12-10-2018 - 02:29
Published 12-10-2018 - 02:29
Last modified 17-10-2018 - 06:29
Back to Top