Discover the impact of CVE-2018-11359 on Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14. Learn about the vulnerability, affected systems, exploitation, and mitigation steps.
Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 were found to have a vulnerability in the RRC dissector and other dissectors that could lead to crashes. The issue was addressed by implementing preventive measures in the epan/proto.c file.
Understanding CVE-2018-11359
This CVE entry identifies a vulnerability in Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 that could result in crashes due to a NULL pointer dereference.
What is CVE-2018-11359?
Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 were susceptible to a vulnerability in the RRC dissector and other dissectors, potentially leading to crashes.
The Impact of CVE-2018-11359
The vulnerability could allow attackers to cause a denial of service (DoS) by crashing the Wireshark application, impacting system availability and potentially leading to information disclosure.
Technical Details of CVE-2018-11359
Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 were affected by the following:
Vulnerability Description
The vulnerability in Wireshark versions could result in crashes due to a NULL pointer dereference in the RRC dissector and other dissectors.
Affected Systems and Versions
Exploitation Mechanism
Attackers could exploit this vulnerability by crafting malicious network packets to trigger the NULL pointer dereference, leading to application crashes.
Mitigation and Prevention
To address CVE-2018-11359, consider the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure timely installation of security updates and patches provided by Wireshark to mitigate the vulnerability.