Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-14340 : What You Need to Know

Discover the impact of CVE-2018-14340 on Wireshark versions 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15. Learn about the vulnerability, affected systems, exploitation, and mitigation steps.

Wireshark versions from 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15 had a vulnerability that could lead to crashes due to a problem with zlib decompression. The issue was addressed by updating the code to prevent buffer over-reads.

Understanding CVE-2018-14340

This CVE entry pertains to a vulnerability in Wireshark versions that could potentially cause crashes when dissectors supporting zlib decompression were used.

What is CVE-2018-14340?

Wireshark versions 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15 were susceptible to crashes when certain dissectors that could decompress zlib were utilized. The vulnerability stemmed from a flaw that allowed buffer over-reads, which was mitigated by rejecting negative lengths in the code.

The Impact of CVE-2018-14340

The vulnerability could be exploited by an attacker to cause crashes in Wireshark instances utilizing the affected versions. This could potentially lead to denial of service or other security implications.

Technical Details of CVE-2018-14340

Wireshark's vulnerability in versions 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15 can be further understood through the following technical details:

Vulnerability Description

The issue in Wireshark versions allowed dissectors supporting zlib decompression to crash due to buffer over-reads. The problem was resolved by updating the code to reject negative lengths.

Affected Systems and Versions

        Wireshark versions 2.6.0 to 2.6.1
        Wireshark versions 2.4.0 to 2.4.7
        Wireshark versions 2.2.0 to 2.2.15

Exploitation Mechanism

The vulnerability could be exploited by utilizing dissectors that support zlib decompression, triggering crashes in the affected Wireshark versions.

Mitigation and Prevention

To address CVE-2018-14340 and enhance security measures, consider the following steps:

Immediate Steps to Take

        Update Wireshark to a non-vulnerable version.
        Monitor official Wireshark channels for security advisories.

Long-Term Security Practices

        Regularly update Wireshark and other software to the latest versions.
        Implement network segmentation to limit the impact of potential vulnerabilities.

Patching and Updates

        Apply patches provided by Wireshark promptly to address known vulnerabilities and enhance security measures.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now