Wireshark 至 3.2.1 EAP Dissector packet-eap.c Packet 注入漏洞

admin 2023-12-01 23:48:24 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
低危 Wireshark 至 3.2.1 EAP Dissector packet-eap.c Packet 注入漏洞

CVE编号

CVE-2020-9428

利用情况

暂无

补丁情况

官方补丁

披露时间

2020-02-28
漏洞描述
Wireshark是一套网络数据包分析软件。Wireshark 3.2.0-3.2.1版本、3.0.0-3.0.8版本、2.6.0-2.6.14版本,EAP解析器在epan/dissectors/packet-eap.c中存在安全漏洞。攻击者可利用该漏洞造成Wireshark崩溃。<br>
解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=9fe2de783dbcbe74144678d60a4e3923367044b2
参考链接
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16397
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9fe2d...
https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security.gentoo.org/glsa/202007-13
https://www.wireshark.org/security/wnpa-sec-2020-05.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 wireshark wireshark * From (including) 2.6.0 Up to (including) 2.6.14
运行在以下环境
应用 wireshark wireshark * From (including) 3.0.0 Up to (including) 3.0.8
运行在以下环境
应用 wireshark wireshark * From (including) 3.2.0 Up to (including) 3.2.1
运行在以下环境
系统 alpine_3.10 wireshark * Up to (excluding) 3.0.9-r0
运行在以下环境
系统 alpine_3.11 wireshark * Up to (excluding) 3.0.9-r0
运行在以下环境
系统 alpine_3.12 wireshark * Up to (excluding) 3.2.2-r0
运行在以下环境
系统 alpine_3.13 wireshark * Up to (excluding) 3.2.2-r0
运行在以下环境
系统 alpine_3.14 wireshark * Up to (excluding) 3.2.2-r0
运行在以下环境
系统 alpine_3.15 wireshark * Up to (excluding) 3.2.2-r0
运行在以下环境
系统 alpine_3.16 wireshark * Up to (excluding) 3.2.2-r0
运行在以下环境
系统 alpine_3.17 wireshark * Up to (excluding) 3.2.2-r0
运行在以下环境
系统 alpine_3.18 wireshark * Up to (excluding) 3.2.2-r0
运行在以下环境
系统 alpine_3.9 wireshark * Up to (excluding) 2.6.15-r0
运行在以下环境
系统 alpine_edge wireshark * Up to (excluding) 3.2.2-r0
运行在以下环境
系统 debian_10 wireshark * Up to (excluding) 2.6.20-0+deb10u1
运行在以下环境
系统 debian_11 wireshark * Up to (excluding) 3.2.2-1
运行在以下环境
系统 debian_12 wireshark * Up to (excluding) 3.2.2-1
运行在以下环境
系统 debian_9 wireshark * Up to (excluding) 2.6.20-0+deb9u1
运行在以下环境
系统 debian_sid wireshark * Up to (excluding) 3.2.2-1
运行在以下环境
系统 fedora_30 wireshark-cli-debuginfo * Up to (excluding) 3.2.2-1.fc30
运行在以下环境
系统 fedora_31 wireshark-cli * Up to (excluding) 3.2.2-1.fc31
运行在以下环境
系统 fedora_32 wireshark-cli * Up to (excluding) 3.2.2-1.fc32
运行在以下环境
系统 kylinos_aarch64_V10SP1 wireshark * Up to (excluding) 2.6.2-18.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 wireshark * Up to (excluding) 2.6.2-18.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP1 wireshark * Up to (excluding) 2.6.2-18.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 wireshark * Up to (excluding) 2.6.2-18.ky10
运行在以下环境
系统 opensuse_Leap_15.1 libmaxminddb0 * Up to (excluding) 1.4.2-lp151.3.3.1
阿里云评分 3.1
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 100
CWE-ID 漏洞类型
CWE-125 跨界内存读
CWE-74 输出中的特殊元素转义处理不恰当(注入)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0