Learn about CVE-2019-5718 affecting Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11. Find out the impact, technical details, and mitigation steps for this vulnerability.
Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11 were affected by a crash issue in the RTSE dissector and other ASN.1 dissectors, which has been resolved by implementing a length check.
Understanding CVE-2019-5718
This CVE entry addresses a vulnerability in Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11 that could lead to crashes in the RTSE dissector and other ASN.1 dissectors.
What is CVE-2019-5718?
In Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, a crash issue affecting the RTSE dissector and other ASN.1 dissectors was identified and fixed by adding a length check for the get_t61_string function in epan/charsets.c.
The Impact of CVE-2019-5718
The vulnerability could result in crashes in Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, potentially leading to denial of service or other security implications.
Technical Details of CVE-2019-5718
This section provides detailed technical information about the CVE.
Vulnerability Description
The vulnerability in Wireshark versions 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11 allowed for crashes in the RTSE dissector and other ASN.1 dissectors due to a lack of proper length checking.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability could be exploited by a remote attacker sending a specially crafted packet to a target system running the affected Wireshark versions.
Mitigation and Prevention
To address CVE-2019-5718, follow these mitigation and prevention steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates