CVE-2017-13765

In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:11

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100551 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100551 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039254 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039254 - Third Party Advisory, VDB Entry
References () https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929 - Issue Tracking, Patch, Vendor Advisory () https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929 - Issue Tracking, Patch, Vendor Advisory
References () https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94666d4357096fc45e3bcad3d9414a14f0831bc8 - () https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94666d4357096fc45e3bcad3d9414a14f0831bc8 -
References () https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html - Mailing List, Third Party Advisory
References () https://www.wireshark.org/security/wnpa-sec-2017-41.html - Vendor Advisory () https://www.wireshark.org/security/wnpa-sec-2017-41.html - Vendor Advisory

Information

Published : 2017-08-30 09:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-13765

Mitre link : CVE-2017-13765

CVE.ORG link : CVE-2017-13765


JSON object : View

Products Affected

debian

  • debian_linux

wireshark

  • wireshark
CWE
CWE-125

Out-of-bounds Read