Learn about CVE-2018-11357 affecting Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14. Discover the impact, technical details, affected systems, exploitation, and mitigation steps.
Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 had a vulnerability causing excessive memory consumption, particularly affecting the LTP dissector and other dissectors. The issue was resolved by rejecting negative lengths in epan/tvbuff.c.
Understanding CVE-2018-11357
This CVE entry addresses a memory consumption vulnerability in Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14.
What is CVE-2018-11357?
The vulnerability in Wireshark versions allowed the LTP dissector and other dissectors to consume excessive memory, impacting system performance and stability.
The Impact of CVE-2018-11357
The vulnerability could lead to memory exhaustion, potentially causing system crashes or slowdowns due to the excessive memory consumption.
Technical Details of CVE-2018-11357
Wireshark vulnerability details and affected systems.
Vulnerability Description
The issue involved excessive memory consumption in Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, specifically affecting the LTP dissector and other dissectors. The fix included rejecting negative lengths in epan/tvbuff.c.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability could be exploited by crafting malicious network packets that trigger the excessive memory consumption in the affected Wireshark versions.
Mitigation and Prevention
Steps to mitigate and prevent the CVE-2018-11357 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates