CVE-2020-25866 PUBLISHED

In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.

EPSS 1.32% · 79.7th percentile

Risk Scores

EPSS Score
1.32%
79.7th percentile

Affected Products

VendorProductVersions
Ubuntu:Pro:14.04:LTSwireshark0, 1.10.2-1, 1.10.3-1
Ubuntu:Pro:18.04:LTSwireshark2.4.2-1, 2.6.10-1~ubuntu18.04.0+esm2, 2.6.10-1~ubuntu18.04.0+esm1
Ubuntu:Pro:20.04:LTSwireshark3.2.3-1ubuntu0.1~esm2, 0, 3.0.5-1
Ubuntu:Pro:16.04:LTSwireshark2.6.3-1~ubuntu16.04.1, 2.2.6+g32dac6a-2ubuntu0.16.04, 2.0.2+ga16e22e-1

Timeline

References

Open in Interactive Console →