Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-5718 : Security Advisory and Response

Learn about CVE-2019-5718 affecting Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11. Find out the impact, technical details, and mitigation steps for this vulnerability.

Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11 were affected by a crash issue in the RTSE dissector and other ASN.1 dissectors, which has been resolved by implementing a length check.

Understanding CVE-2019-5718

This CVE entry addresses a vulnerability in Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11 that could lead to crashes in the RTSE dissector and other ASN.1 dissectors.

What is CVE-2019-5718?

In Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, a crash issue affecting the RTSE dissector and other ASN.1 dissectors was identified and fixed by adding a length check for the get_t61_string function in epan/charsets.c.

The Impact of CVE-2019-5718

The vulnerability could result in crashes in Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, potentially leading to denial of service or other security implications.

Technical Details of CVE-2019-5718

This section provides detailed technical information about the CVE.

Vulnerability Description

The vulnerability in Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11 allowed for crashes in the RTSE dissector and other ASN.1 dissectors due to a lack of proper length checking.

Affected Systems and Versions

        Wireshark versions 2.6.0 to 2.6.5
        Wireshark versions 2.4.0 to 2.4.11

Exploitation Mechanism

The vulnerability could be exploited by a remote attacker sending a specially crafted packet to a target system running the affected Wireshark versions.

Mitigation and Prevention

To address CVE-2019-5718, follow these mitigation and prevention steps:

Immediate Steps to Take

        Update Wireshark to the latest patched version.
        Avoid opening suspicious or untrusted capture files.
        Monitor vendor advisories for any further updates or patches.

Long-Term Security Practices

        Regularly update Wireshark and other software to the latest versions.
        Implement network segmentation to limit the impact of potential attacks.

Patching and Updates

        Apply patches provided by Wireshark promptly to address the vulnerability and prevent exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now