CVE Vulnerabilities

CVE-2013-1586

Published: Feb 03, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
2.9 LOW
AV:A/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 LOW
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

Affected Software

NameVendorStart VersionEnd Version
WiresharkWireshark1.6.0 (including)1.6.0 (including)
WiresharkWireshark1.6.1 (including)1.6.1 (including)
WiresharkWireshark1.6.2 (including)1.6.2 (including)
WiresharkWireshark1.6.3 (including)1.6.3 (including)
WiresharkWireshark1.6.4 (including)1.6.4 (including)
WiresharkWireshark1.6.5 (including)1.6.5 (including)
WiresharkWireshark1.6.6 (including)1.6.6 (including)
WiresharkWireshark1.6.7 (including)1.6.7 (including)
WiresharkWireshark1.6.8 (including)1.6.8 (including)
WiresharkWireshark1.6.9 (including)1.6.9 (including)
WiresharkWireshark1.6.10 (including)1.6.10 (including)
WiresharkWireshark1.6.11 (including)1.6.11 (including)
WiresharkWireshark1.6.12 (including)1.6.12 (including)
WiresharkUbuntuhardy*
WiresharkUbuntulucid*
WiresharkUbuntuoneiric*
WiresharkUbuntuprecise*
WiresharkUbuntuquantal*
WiresharkUbunturaring*
WiresharkUbuntusaucy*
WiresharkUbuntuupstream*

References