Vulnerability Description
In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting recursion.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wireshark | Wireshark | >= 2.4.0, <= 2.4.14 |
| Debian | Debian Linux | 9.0 |
| Canonical | Ubuntu Linux | 16.04 |
| F5 | Big-Ip Access Policy Manager | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Advanced Firewall Manager | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Analytics | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Application Acceleration Manager | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Application Security Manager | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Domain Name System | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Edge Gateway | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Fraud Protection Service | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Global Traffic Manager | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Link Controller | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Local Traffic Manager | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Policy Enforcement Manager | >= 12.1.3.6, < 12.1.5.3 |
| F5 | Big-Ip Webaccelerator | >= 12.1.3.6, < 12.1.5.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/108464Broken Link
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15778Issue TrackingPatchVendor Advisory
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7b6e197d
- https://lists.debian.org/debian-lts-announce/2020/10/msg00036.htmlMailing ListThird Party Advisory
- https://support.f5.com/csp/article/K06725231Third Party Advisory
- https://support.f5.com/csp/article/K06725231?utm_source=f5support&%3Butm_medi
- https://usn.ubuntu.com/4133-1/Third Party Advisory
- https://www.wireshark.org/security/wnpa-sec-2019-19.htmlVendor Advisory
- http://www.securityfocus.com/bid/108464Broken Link
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15778Issue TrackingPatchVendor Advisory
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7b6e197d
- https://lists.debian.org/debian-lts-announce/2020/10/msg00036.htmlMailing ListThird Party Advisory
- https://support.f5.com/csp/article/K06725231Third Party Advisory
- https://support.f5.com/csp/article/K06725231?utm_source=f5support&%3Butm_medi
- https://usn.ubuntu.com/4133-1/Third Party Advisory
FAQ
What is CVE-2019-12295?
CVE-2019-12295 is a vulnerability with a CVSS score of 7.5 (HIGH). In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting r...
How severe is CVE-2019-12295?
CVE-2019-12295 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-12295?
Check the references section above for vendor advisories and patch information. Affected products include: Wireshark Wireshark, Debian Debian Linux, Canonical Ubuntu Linux, F5 Big-Ip Access Policy Manager, F5 Big-Ip Advanced Firewall Manager.