Learn about CVE-2020-11647 affecting Wireshark versions 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15. Find out how to mitigate the vulnerability and prevent potential crashes in the BACapp dissector.
Wireshark versions 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15 are affected by a vulnerability in the BACapp dissector that could lead to a crash. The issue has been resolved by limiting recursion in the packet-bacapp.c file.
Understanding CVE-2020-11647
Wireshark versions 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15 are susceptible to a crash due to a flaw in the BACapp dissector.
What is CVE-2020-11647?
This CVE refers to a vulnerability in Wireshark versions 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15 that could cause the BACapp dissector to crash.
The Impact of CVE-2020-11647
The vulnerability could be exploited to crash the BACapp dissector in affected Wireshark versions, potentially leading to denial of service.
Technical Details of CVE-2020-11647
Wireshark versions 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15 are affected by this vulnerability.
Vulnerability Description
The issue arises from the BACapp dissector in Wireshark, which could crash due to excessive recursion.
Affected Systems and Versions
Exploitation Mechanism
Attackers could exploit this vulnerability by sending specially crafted network packets to trigger excessive recursion in the BACapp dissector, leading to a crash.
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent the exploitation of CVE-2020-11647.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that all systems running Wireshark are updated with the latest security patches to mitigate the risk of exploitation.