Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-17935 : What You Need to Know

Learn about CVE-2017-17935 affecting Wireshark versions 2.2.11 and below. Discover the impact, technical details, and mitigation steps for this denial of service vulnerability.

Wireshark version 2.2.11 and below are affected by a vulnerability in the File_read_line function that allows remote attackers to trigger a denial of service attack.

Understanding CVE-2017-17935

This CVE entry describes a vulnerability in Wireshark versions 2.2.11 and below that can be exploited by remote attackers to cause a denial of service.

What is CVE-2017-17935?

The vulnerability in Wireshark version 2.2.11 and below lies in the File_read_line function, which fails to effectively remove '\n' characters. This flaw can be exploited by remote attackers to trigger a denial of service by causing a buffer underflow and crashing the application.

The Impact of CVE-2017-17935

The vulnerability allows remote attackers to exploit a denial of service by triggering a buffer underflow and causing the application to crash. This attack is initiated by sending a carefully crafted packet that triggers the attempted processing of an empty line.

Technical Details of CVE-2017-17935

Wireshark version: 2.2.11 and below

Vulnerability Description

The File_read_line function in Wireshark versions 2.2.11 and below does not properly strip '\n' characters, enabling remote attackers to cause a denial of service through a crafted packet.

Affected Systems and Versions

        Product: Wireshark
        Vendor: N/A
        Versions affected: 2.2.11 and below

Exploitation Mechanism

        Attackers exploit the vulnerability by sending a carefully crafted packet that triggers the processing of an empty line, leading to a denial of service.

Mitigation and Prevention

Immediate action and long-term security practices are essential to mitigate the risks associated with CVE-2017-17935.

Immediate Steps to Take

        Update Wireshark to a non-vulnerable version.
        Monitor network traffic for any signs of exploitation.

Long-Term Security Practices

        Regularly update software and security patches.
        Implement network segmentation to limit the impact of potential attacks.
        Conduct regular security assessments and penetration testing.

Patching and Updates

        Apply the security update provided by Wireshark to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now