CVE-2020-9428

Name
CVE-2020-9428
Description
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=9fe2de783dbcbe74144678d60a4e3923367044b2
Vendor Advisory https://www.wireshark.org/security/wnpa-sec-2020-05.html
Exploit https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16397
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZBICEY2HGSNQ3RPBLMDDYVAHGOGS4E2/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XN2GMGLT5XND7U34WX3O23WKUZ7JHMVN/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDVMBCADP73TBISYCS6ARKOSNNJOGXXZ/
Third Party Advisory https://security.gentoo.org/glsa/202007-13
Mailing List https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* wireshark >= 2.6.0 <= 2.6.14
cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* wireshark >= 3.0.0 <= 3.0.8
cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* wireshark >= 3.2.0 <= 3.2.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status