Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-11357 : Vulnerability Insights and Analysis

Learn about CVE-2018-11357 affecting Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14. Discover the impact, technical details, affected systems, exploitation, and mitigation steps.

Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 had a vulnerability causing excessive memory consumption, particularly affecting the LTP dissector and other dissectors. The issue was resolved by rejecting negative lengths in epan/tvbuff.c.

Understanding CVE-2018-11357

This CVE entry addresses a memory consumption vulnerability in Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14.

What is CVE-2018-11357?

The vulnerability in Wireshark versions allowed the LTP dissector and other dissectors to consume excessive memory, impacting system performance and stability.

The Impact of CVE-2018-11357

The vulnerability could lead to memory exhaustion, potentially causing system crashes or slowdowns due to the excessive memory consumption.

Technical Details of CVE-2018-11357

Wireshark vulnerability details and affected systems.

Vulnerability Description

The issue involved excessive memory consumption in Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, specifically affecting the LTP dissector and other dissectors. The fix included rejecting negative lengths in epan/tvbuff.c.

Affected Systems and Versions

        Wireshark 2.6.0
        Wireshark 2.4.0 to 2.4.6
        Wireshark 2.2.0 to 2.2.14

Exploitation Mechanism

The vulnerability could be exploited by crafting malicious network packets that trigger the excessive memory consumption in the affected Wireshark versions.

Mitigation and Prevention

Steps to mitigate and prevent the CVE-2018-11357 vulnerability.

Immediate Steps to Take

        Update Wireshark to the latest version to apply the necessary security patches.
        Monitor system resources for any signs of abnormal memory consumption.

Long-Term Security Practices

        Regularly update and patch software to address known vulnerabilities.
        Implement network monitoring tools to detect unusual network traffic patterns.

Patching and Updates

        Apply official patches and updates provided by Wireshark to fix the memory consumption vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now