Description
The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.
References (5)
Core 5
Core References
Issue Tracking x_refsource_misc
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14295
Issue Tracking, Patch x_refsource_misc
https://code.wireshark.org/review/#/c/24997/
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/102311
Scores
CVSS v3
7.5
EPSS
0.0033
EPSS Percentile
56.3%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (2)
debian/debian_linux
8.0
wireshark/wireshark
< 2.2.11
Published
Dec 27, 2017
Tracked Since
Feb 18, 2026