ID

VAR-201611-0326


CVE

CVE-2016-9372


TITLE

Wireshark Profinet I/O Parser Denial of Service Vulnerability

Trust: 0.8

sources: IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2 // CNVD: CNVD-2016-11354

DESCRIPTION

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects. Wireshark (formerly known as Ethereal) is a suite of network packet analysis software developed by the Wireshark team. The function of the software is to intercept network packets and display detailed data for analysis. A denial of service vulnerability exists in Wireshark versions 2.2.0 through 2.2.1 and Profinet I/O parsers in versions 2.0.0 through 2.0.7. An attacker could exploit the vulnerability to cause a denial of service (crash). Wireshark is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets. Successful exploitation of the issue will cause excessive CPU resource consumption, resulting in a denial-of-service condition. Wireshark 2.2.0 and 2.2.1 vulnerable

Trust: 2.7

sources: NVD: CVE-2016-9372 // JVNDB: JVNDB-2016-005900 // CNVD: CNVD-2016-11354 // BID: 94368 // IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2 // VULMON: CVE-2016-9372

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2 // CNVD: CNVD-2016-11354

AFFECTED PRODUCTS

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.1

Trust: 1.9

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.0

Trust: 1.6

vendor:wiresharkmodel:wiresharkscope:ltversion:2.2.x

Trust: 0.8

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.2

Trust: 0.8

vendor:wiresharkmodel:wiresharkscope:gteversion:2.2.0<=2.2.1

Trust: 0.6

vendor:wiresharkmodel:wiresharkscope:gteversion:2.0.0<=2.0.7

Trust: 0.6

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.3

Trust: 0.3

vendor:wiresharkmodel:wiresharkscope:neversion:2.2.2

Trust: 0.3

vendor:wiresharkmodel: - scope:eqversion:2.2.0

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.1

Trust: 0.2

sources: IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2 // CNVD: CNVD-2016-11354 // BID: 94368 // JVNDB: JVNDB-2016-005900 // CNNVD: CNNVD-201611-389 // NVD: CVE-2016-9372

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-9372
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-9372
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-11354
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201611-389
value: MEDIUM

Trust: 0.6

IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2
value: MEDIUM

Trust: 0.2

VULMON: CVE-2016-9372
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-9372
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-11354
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2016-9372
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2 // CNVD: CNVD-2016-11354 // VULMON: CVE-2016-9372 // JVNDB: JVNDB-2016-005900 // CNNVD: CNNVD-201611-389 // NVD: CVE-2016-9372

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.8

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2016-005900 // NVD: CVE-2016-9372

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201611-389

TYPE

Resource management error

Trust: 0.8

sources: IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2 // CNNVD: CNNVD-201611-389

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005900

PATCH

title:Profinet I/O: Sanity check number of I/O objectsurl:https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=4127e3930ef663114567002001f44e01eba8a250

Trust: 0.8

title:Bug 12851url:https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12851

Trust: 0.8

title:wnpa-sec-2016-58url:https://www.wireshark.org/security/wnpa-sec-2016-58.html

Trust: 0.8

title:Patch for Wireshark Profinet I/O Parser Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/84123

Trust: 0.6

title:Wireshark Profinet I/O Remediation measures for resolver security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65746

Trust: 0.6

title:Red Hat: CVE-2016-9372url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2016-9372

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=a2bac27fb002bed513645d4775c7275b

Trust: 0.1

title:rhsecapiurl:https://github.com/RedHatOfficial/rhsecapi

Trust: 0.1

title:cve-pyliburl:https://github.com/RedHatProductSecurity/cve-pylib

Trust: 0.1

sources: CNVD: CNVD-2016-11354 // VULMON: CVE-2016-9372 // JVNDB: JVNDB-2016-005900 // CNNVD: CNNVD-201611-389

EXTERNAL IDS

db:NVDid:CVE-2016-9372

Trust: 3.6

db:BIDid:94368

Trust: 2.0

db:SECTRACKid:1037313

Trust: 1.1

db:CNVDid:CNVD-2016-11354

Trust: 0.8

db:CNNVDid:CNNVD-201611-389

Trust: 0.8

db:JVNDBid:JVNDB-2016-005900

Trust: 0.8

db:IVDid:438CDD76-FB63-4B5B-88A9-C121330ED8F2

Trust: 0.2

db:VULMONid:CVE-2016-9372

Trust: 0.1

sources: IVD: 438cdd76-fb63-4b5b-88a9-c121330ed8f2 // CNVD: CNVD-2016-11354 // VULMON: CVE-2016-9372 // BID: 94368 // JVNDB: JVNDB-2016-005900 // CNNVD: CNNVD-201611-389 // NVD: CVE-2016-9372

REFERENCES

url:http://www.securityfocus.com/bid/94368

Trust: 1.8

url:https://www.wireshark.org/security/wnpa-sec-2016-58.html

Trust: 1.7

url:https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12851

Trust: 1.7

url:https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=4127e3930ef663114567002001f44e01eba8a250

Trust: 1.3

url:http://www.securitytracker.com/id/1037313

Trust: 1.1

url:https://code.wireshark.org/review/gitweb?p=wireshark.git%3ba=commit%3bh=4127e3930ef663114567002001f44e01eba8a250

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9372

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9372

Trust: 0.8

url:http://www.wireshark.org/

Trust: 0.3

url:https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12851

Trust: 0.3

url:https://www.oracle.com/technetwork/topics/security/bulletinjan2017-3431551.html

Trust: 0.3

url:https://www.wireshark.org/security/wnpa-sec-2016-58.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-9372

Trust: 0.1

url:https://github.com/redhatofficial/rhsecapi

Trust: 0.1

sources: CNVD: CNVD-2016-11354 // VULMON: CVE-2016-9372 // BID: 94368 // JVNDB: JVNDB-2016-005900 // CNNVD: CNNVD-201611-389 // NVD: CVE-2016-9372

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 94368

SOURCES

db:IVDid:438cdd76-fb63-4b5b-88a9-c121330ed8f2
db:CNVDid:CNVD-2016-11354
db:VULMONid:CVE-2016-9372
db:BIDid:94368
db:JVNDBid:JVNDB-2016-005900
db:CNNVDid:CNNVD-201611-389
db:NVDid:CVE-2016-9372

LAST UPDATE DATE

2024-11-23T21:42:21.916000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-11354date:2016-11-21T00:00:00
db:VULMONid:CVE-2016-9372date:2017-07-28T00:00:00
db:BIDid:94368date:2017-02-02T05:00:00
db:JVNDBid:JVNDB-2016-005900date:2016-11-18T00:00:00
db:CNNVDid:CNNVD-201611-389date:2016-11-18T00:00:00
db:NVDid:CVE-2016-9372date:2024-11-21T03:01:02.540

SOURCES RELEASE DATE

db:IVDid:438cdd76-fb63-4b5b-88a9-c121330ed8f2date:2016-11-21T00:00:00
db:CNVDid:CNVD-2016-11354date:2016-11-21T00:00:00
db:VULMONid:CVE-2016-9372date:2016-11-17T00:00:00
db:BIDid:94368date:2016-11-16T00:00:00
db:JVNDBid:JVNDB-2016-005900date:2016-11-18T00:00:00
db:CNNVDid:CNNVD-201611-389date:2016-11-18T00:00:00
db:NVDid:CVE-2016-9372date:2016-11-17T05:59:00.163