CVE Vulnerabilities

CVE-2017-15191

Use of Externally-Controlled Format String

Published: Oct 10, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
WiresharkWireshark2.0.0 (including)2.0.15 (including)
WiresharkWireshark2.2.0 (including)2.2.9 (including)
WiresharkWireshark2.4.0 (including)2.4.1 (including)
WiresharkUbuntuartful*
WiresharkUbuntubionic*
WiresharkUbuntuesm-apps/bionic*
WiresharkUbuntuesm-apps/xenial*
WiresharkUbuntuesm-infra-legacy/trusty*
WiresharkUbuntutrusty*
WiresharkUbuntutrusty/esm*
WiresharkUbuntuxenial*
WiresharkUbuntuzesty*

Potential Mitigations

References