CVE-2018-14342 PUBLISHED

In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.

EPSS 1.33% · 79.9th percentile

Risk Scores

EPSS Score
1.33%
79.9th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSwireshark0, 1.12.7+g7fc8978-1, 1.12.8+g5b6e543-2
Ubuntu:14.04:LTSwireshark1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1, 0, 1.10.2-1
Ubuntu:18.04:LTSwireshark0, 2.4.2-1, 2.4.3-1

Timeline

References

Open in Interactive Console →