CVE-2017-11408
CVSS5.0
发布时间 :2017-07-18 17:29:00
修订时间 :2017-12-10 21:29:00
NP    

[原文]In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the AMQP dissector could crash. This was addressed in epan/dissectors/packet-amqp.c by checking for successful list dissection.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/a:wireshark:wireshark:2.0.0
cpe:/a:wireshark:wireshark:2.0.1
cpe:/a:wireshark:wireshark:2.0.2
cpe:/a:wireshark:wireshark:2.0.3
cpe:/a:wireshark:wireshark:2.0.4
cpe:/a:wireshark:wireshark:2.0.5
cpe:/a:wireshark:wireshark:2.0.6
cpe:/a:wireshark:wireshark:2.0.7
cpe:/a:wireshark:wireshark:2.0.8
cpe:/a:wireshark:wireshark:2.0.9
cpe:/a:wireshark:wireshark:2.0.10
cpe:/a:wireshark:wireshark:2.0.11
cpe:/a:wireshark:wireshark:2.0.12
cpe:/a:wireshark:wireshark:2.0.13
cpe:/a:wireshark:wireshark:2.2.0
cpe:/a:wireshark:wireshark:2.2.1
cpe:/a:wireshark:wireshark:2.2.2
cpe:/a:wireshark:wireshark:2.2.3
cpe:/a:wireshark:wireshark:2.2.4
cpe:/a:wireshark:wireshark:2.2.5
cpe:/a:wireshark:wireshark:2.2.6
cpe:/a:wireshark:wireshark:2.2.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11408
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11408
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/99894
(UNKNOWN)  BID  99894
http://www.securitytracker.com/id/1038966
(UNKNOWN)  SECTRACK  1038966
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13780
(VENDOR_ADVISORY)  CONFIRM  https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13780
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a102c172b0b2fe231fdb49f4f6694603f5b93b0c
(VENDOR_ADVISORY)  CONFIRM  https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a102c172b0b2fe231fdb49f4f6694603f5b93b0c
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e57c86ef8e3b57b7f90c224f6053d1eacf20e1ba
(VENDOR_ADVISORY)  CONFIRM  https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e57c86ef8e3b57b7f90c224f6053d1eacf20e1ba
https://www.debian.org/security/2017/dsa-4060
(UNKNOWN)  DEBIAN  DSA-4060
https://www.wireshark.org/security/wnpa-sec-2017-34.html
(VENDOR_ADVISORY)  CONFIRM  https://www.wireshark.org/security/wnpa-sec-2017-34.html

- 漏洞信息 (F145369)

Debian Security Advisory 4060-1 (PacketStormID:F145369)
2017-12-12 00:00:00
Debian  debian.org
advisory,arbitrary,vulnerability,protocol
linux,debian
CVE-2017-11408,CVE-2017-13766,CVE-2017-17083,CVE-2017-17084,CVE-2017-17085
[点击下载]

Debian Linux Security Advisory 4060-1 - It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4060-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 09, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2017-11408 CVE-2017-13766 CVE-2017-17083 CVE-2017-17084 
                 CVE-2017-17085

It was discovered that wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA,
NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the
execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.12.1+g01b65bf-4+deb8u12.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u1.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=JKbF
-----END PGP SIGNATURE-----
    
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站