CVE-2013-4081

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.

References

http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623&r2=49622&pathrev=49623

http://anonsvn.wireshark.org/viewvc?view=revision&revision=49623

http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html

http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html

http://rhn.redhat.com/errata/RHSA-2014-0341.html

http://secunia.com/advisories/53762

http://secunia.com/advisories/54425

http://www.debian.org/security/2013/dsa-2709

http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml

http://www.mandriva.com/security/advisories?name=MDVSA-2013:172

http://www.securityfocus.com/bid/60505

http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html

http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html

http://www.wireshark.org/security/wnpa-sec-2013-39.html

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16820

Details

Source: MITRE

Published: 2013-06-09

Updated: 2018-10-30

Type: CWE-119

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
83596SUSE SLED10 / SLES10 Security Update : wireshark (SUSE-SU-2013:1276-1)NessusSuSE Local Security Checks
high
79601F5 Networks BIG-IP : Multiple Wireshark vulnerabilities (K15868)NessusF5 Networks Local Security Checks
high
79162CentOS 6 : wireshark (CESA-2013:1569)NessusCentOS Local Security Checks
high
73285Scientific Linux Security Update : wireshark on SL5.x i386/x86_64 (20140331)NessusScientific Linux Local Security Checks
high
73281RHEL 5 : wireshark (RHSA-2014:0341)NessusRed Hat Local Security Checks
high
73279Oracle Linux 5 : wireshark (ELSA-2014-0341)NessusOracle Linux Local Security Checks
high
73276CentOS 5 : wireshark (CESA-2014:0341)NessusCentOS Local Security Checks
high
71543Fedora 18 : wireshark-1.10.2-4.fc18 (2013-17635)NessusFedora Local Security Checks
high
71301Scientific Linux Security Update : wireshark on SL6.x i386/x86_64 (20131121)NessusScientific Linux Local Security Checks
high
71268Amazon Linux AMI : wireshark (ALAS-2013-251)NessusAmazon Linux Local Security Checks
high
71105Oracle Linux 6 : wireshark (ELSA-2013-1569)NessusOracle Linux Local Security Checks
high
71005RHEL 6 : wireshark (RHSA-2013:1569)NessusRed Hat Local Security Checks
high
70280Fedora 20 : wireshark-1.10.2-7.fc20 (2013-17627)NessusFedora Local Security Checks
high
70181Fedora 19 : wireshark-1.10.2-6.fc19 (2013-17661)NessusFedora Local Security Checks
high
69500GLSA-201308-05 : Wireshark: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
69169SuSE 10 Security Update : wireshark (ZYPP Patch Number 8659)NessusSuSE Local Security Checks
high
69091SuSE 11.2 / 11.3 Security Update : wireshark (SAT Patch Numbers 8044 / 8045)NessusSuSE Local Security Checks
high
66910Debian DSA-2709-1 : wireshark - several vulnerabilitiesNessusDebian Local Security Checks
medium
66895Wireshark 1.8.x < 1.8.8 Multiple VulnerabilitiesNessusWindows
medium
66894Wireshark 1.6.x < 1.6.16 Multiple DoS VulnerabilitiesNessusWindows
medium
66881Mandriva Linux Security Advisory : wireshark (MDVSA-2013:172)NessusMandriva Local Security Checks
medium