CVE-2017-17935 PUBLISHED

The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.

EPSS 0.58% · 68.8th percentile

Risk Scores

EPSS Score
0.58%
68.8th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSwireshark0, 1.10.2-1, 1.10.3-1
Ubuntu:16.04:LTSwireshark0, 1.12.7+g7fc8978-1, 1.12.8+g5b6e543-2
Ubuntu:18.04:LTSwireshark0, 2.4.2-1, 2.4.3-1

Timeline

References

Open in Interactive Console →