Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-11360 : What You Need to Know

Learn about CVE-2018-11360 affecting Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14. Discover the impact, technical details, and mitigation steps for this buffer overflow vulnerability.

Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 were affected by a potential crash issue in the GSM A DTAP dissector due to an off-by-one error causing a buffer overflow.

Understanding CVE-2018-11360

This CVE entry highlights a vulnerability in Wireshark versions that could lead to a crash due to a specific error in the GSM A DTAP dissector.

What is CVE-2018-11360?

The GSM A DTAP dissector in Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 had a potential crash issue due to an off-by-one error causing a buffer overflow.

The Impact of CVE-2018-11360

The vulnerability could potentially lead to a crash of Wireshark, affecting its availability and potentially causing denial of service.

Technical Details of CVE-2018-11360

Wireshark versions 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14 were susceptible to a buffer overflow due to an off-by-one error in the GSM A DTAP dissector.

Vulnerability Description

The issue stemmed from an off-by-one error in the epan/dissectors/packet-gsm_a_dtap.c file, leading to a buffer overflow and potential crash.

Affected Systems and Versions

        Wireshark 2.6.0
        Wireshark 2.4.0 to 2.4.6
        Wireshark 2.2.0 to 2.2.14

Exploitation Mechanism

Exploiting this vulnerability required crafting a specific GSM A DTAP packet to trigger the buffer overflow and potentially crash Wireshark.

Mitigation and Prevention

Taking immediate steps and implementing long-term security practices are crucial to mitigating the risks associated with CVE-2018-11360.

Immediate Steps to Take

        Update Wireshark to a patched version that addresses the buffer overflow issue.
        Avoid opening suspicious or untrusted network traces in Wireshark.

Long-Term Security Practices

        Regularly update Wireshark and other software to the latest versions to patch known vulnerabilities.
        Implement network segmentation to limit the impact of potential attacks on Wireshark.

Patching and Updates

Ensure timely application of patches and updates released by Wireshark to address vulnerabilities like the buffer overflow in the GSM A DTAP dissector.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now