CVE-2018-11356

Name
CVE-2018-11356
Description
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.wireshark.org/security/wnpa-sec-2018-29.html
Patch https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=4425716ddba99374749bd033d9bc0f4add2fb973
Issue Tracking https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
Third Party Advisory http://www.securityfocus.com/bid/104308
Third Party Advisory http://www.securitytracker.com/id/1041036
Mailing List https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* wireshark >= 2.4.0 <= 2.4.6
cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* wireshark >= 2.2.0 <= 2.2.14
cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:* wireshark == None == 2.6.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status