ID

VAR-201708-1254


CVE

CVE-2017-13766


TITLE

Wireshark Profinet I/O Parser Denial of Service Vulnerability

Trust: 0.8

sources: IVD: 0255aa7b-2bd4-4eed-aa31-3973e910869e // CNVD: CNVD-2017-30755

DESCRIPTION

In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation. Wireshark Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Wireshark is a suite of network packet analysis software developed by the Wireshark team. The Wireshark Profinet I/O parser has a security vulnerability that allows an attacker to exploit a vulnerability to submit a special request for a denial of service attack. Wireshark is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets. An attacker can leverage this issue to crash the affected application, denying service to legitimate users. Wireshark 2.4.0 and 2.2.0 through 2.2.8 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4060-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 09, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wireshark CVE ID : CVE-2017-11408 CVE-2017-13766 CVE-2017-17083 CVE-2017-17084 CVE-2017-17085 It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the execution of arbitrary code. For the oldstable distribution (jessie), these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u12. For the stable distribution (stretch), these problems have been fixed in version 2.2.6+g32dac6a-2+deb9u1. We recommend that you upgrade your wireshark packages. For the detailed security status of wireshark please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wireshark Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlorzcgACgkQEMKTtsN8 Tjbdrg//TwdPY0X/BByo9yCHBaDJiTjq5YtIW5QY3BpPreFH2vlJnF/xCPc2C01y XmIOfRmSn17750SI459dUnovaD8OA51lexYWHbCesTdw/9eXSazssYitckUwOSnz CTx+tp9XqXMrZuDQOdFXqItnZ2nr5K0xTSHVu1lmkJL4C4waItkefEpQHwolKQaH tMdEWd2jM/jjm+dU9Dlo+6pghZdPNXzawzm7273Ca8gwGkGt4SCf/s9ruhJc113c hgQ8NzdASNdvnj28o9dQ0V9ooUxq6SEItSOCMXeq+P+Qfk1RTqT83SOZtEdGmtol yFMenLaVeoNzrrDTSNJuXeGPwJFOFcKY5la5ob3+pae4F+mAmyd7CVMsXVLhiVf8 CS6sGnsyaXugTXQKsfG2l9d5chfMJ/Qj1iAzY0gn2Jt6zOc5sROVvG/ItT6U2vF1 WiUPVULyUdHR1cFdDudA04fQaeY+PzDj0TJ7/iRAT0evK6lp405Yhz0mz6Ro2b3K eQfuF7aLVKYOLEqvjdnEZV1cFAYyySEMPXsxWS9sKyWzImKsOIEBFzTMDglMoZd8 1TMgvr+WCRmpp5XMldIoDNydUkmMdeGQcEtUH4kKWdOs/RRC3218GwtYaJ10WfwX 7rSSoViG1VSG/HPXRY++S8GLSe6aRE0ABfP9stsY2HKheKcXowA= =JKbF -----END PGP SIGNATURE-----

Trust: 2.79

sources: NVD: CVE-2017-13766 // JVNDB: JVNDB-2017-007387 // CNVD: CNVD-2017-30755 // BID: 100542 // IVD: 0255aa7b-2bd4-4eed-aa31-3973e910869e // VULMON: CVE-2017-13766 // PACKETSTORM: 145369

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 0255aa7b-2bd4-4eed-aa31-3973e910869e // CNVD: CNVD-2017-30755

AFFECTED PRODUCTS

vendor:wiresharkmodel:wiresharkscope:eqversion:2.4.0

Trust: 3.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.7

Trust: 1.9

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.6

Trust: 1.9

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.5

Trust: 1.9

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.4

Trust: 1.9

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.3

Trust: 1.9

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.2

Trust: 1.9

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.1

Trust: 1.9

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.13

Trust: 1.6

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.0

Trust: 1.6

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.6

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.1

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.4

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.8

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.9

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.11

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.10

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.3

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.2

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.0

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.5

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.12

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.0.7

Trust: 1.0

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.0 to 2.2.8

Trust: 0.8

vendor:wiresharkmodel:wiresharkscope:gteversion:2.2.0,<=2.2.8

Trust: 0.6

vendor:wiresharkmodel:wiresharkscope:eqversion:2.4

Trust: 0.3

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2.8

Trust: 0.3

vendor:wiresharkmodel:wiresharkscope:eqversion:2.2

Trust: 0.3

vendor:wiresharkmodel:wiresharkscope:neversion:2.4.1

Trust: 0.3

vendor:wiresharkmodel:wiresharkscope:neversion:2.2.9

Trust: 0.3

vendor:wiresharkmodel: - scope:eqversion:2.0.0

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.1

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.2

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.3

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.4

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.5

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.6

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.7

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.8

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.9

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.10

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.11

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.12

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.0.13

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.0

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.1

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.2

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.3

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.4

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.5

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.6

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.2.7

Trust: 0.2

vendor:wiresharkmodel: - scope:eqversion:2.4.0

Trust: 0.2

sources: IVD: 0255aa7b-2bd4-4eed-aa31-3973e910869e // CNVD: CNVD-2017-30755 // BID: 100542 // JVNDB: JVNDB-2017-007387 // CNNVD: CNNVD-201708-1295 // NVD: CVE-2017-13766

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-13766
value: HIGH

Trust: 1.0

NVD: CVE-2017-13766
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-30755
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201708-1295
value: MEDIUM

Trust: 0.6

IVD: 0255aa7b-2bd4-4eed-aa31-3973e910869e
value: MEDIUM

Trust: 0.2

VULMON: CVE-2017-13766
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-13766
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-30755
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0255aa7b-2bd4-4eed-aa31-3973e910869e
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-13766
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: 0255aa7b-2bd4-4eed-aa31-3973e910869e // CNVD: CNVD-2017-30755 // VULMON: CVE-2017-13766 // JVNDB: JVNDB-2017-007387 // CNNVD: CNNVD-201708-1295 // NVD: CVE-2017-13766

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.8

sources: JVNDB: JVNDB-2017-007387 // NVD: CVE-2017-13766

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201708-1295

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201708-1295

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007387

PATCH

title:PNIO: Fix another potential OOB write.url:https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=af7b093ca528516c14247acb545046199d30843e

Trust: 0.8

title:Fix potential oob write crashesurl:https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2096bc1e5078732543e0a3ee115a2ce520a72bbc

Trust: 0.8

title:Bug 13847url:https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847

Trust: 0.8

title:wnpa-sec-2017-39url:https://www.wireshark.org/security/wnpa-sec-2017-39.html

Trust: 0.8

title:Patch for Wireshark Profinet I/O Parser Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/104164

Trust: 0.6

title:Wireshark Profinet I/O Remediation measures for resolver security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74464

Trust: 0.6

title:Red Hat: CVE-2017-13766url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2017-13766

Trust: 0.1

title:Debian Security Advisories: DSA-4060-1 wireshark -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9fa9c0d441399d6fc65360f421999159

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=6283337cd31f81f24d445925f2138c0e

Trust: 0.1

sources: CNVD: CNVD-2017-30755 // VULMON: CVE-2017-13766 // JVNDB: JVNDB-2017-007387 // CNNVD: CNNVD-201708-1295

EXTERNAL IDS

db:NVDid:CVE-2017-13766

Trust: 3.7

db:BIDid:100542

Trust: 2.0

db:SECTRACKid:1039254

Trust: 1.1

db:CNVDid:CNVD-2017-30755

Trust: 0.8

db:CNNVDid:CNNVD-201708-1295

Trust: 0.8

db:JVNDBid:JVNDB-2017-007387

Trust: 0.8

db:IVDid:0255AA7B-2BD4-4EED-AA31-3973E910869E

Trust: 0.2

db:VULMONid:CVE-2017-13766

Trust: 0.1

db:PACKETSTORMid:145369

Trust: 0.1

sources: IVD: 0255aa7b-2bd4-4eed-aa31-3973e910869e // CNVD: CNVD-2017-30755 // VULMON: CVE-2017-13766 // BID: 100542 // JVNDB: JVNDB-2017-007387 // PACKETSTORM: 145369 // CNNVD: CNNVD-201708-1295 // NVD: CVE-2017-13766

REFERENCES

url:https://www.wireshark.org/security/wnpa-sec-2017-39.html

Trust: 2.0

url:https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2017-13766

Trust: 1.5

url:http://www.securityfocus.com/bid/100542

Trust: 1.2

url:http://www.securitytracker.com/id/1039254

Trust: 1.1

url:https://www.debian.org/security/2017/dsa-4060

Trust: 1.1

url:https://code.wireshark.org/review/gitweb?p=wireshark.git%3ba=commit%3bh=2096bc1e5078732543e0a3ee115a2ce520a72bbc

Trust: 1.0

url:https://code.wireshark.org/review/gitweb?p=wireshark.git%3ba=commit%3bh=af7b093ca528516c14247acb545046199d30843e

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13766

Trust: 0.8

url:https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=af7b093ca528516c14247acb545046199d30843e

Trust: 0.7

url:https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2096bc1e5078732543e0a3ee115a2ce520a72bbc

Trust: 0.7

url:http://www.wireshark.org/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-13766

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=55023

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11408

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17083

Trust: 0.1

url:https://security-tracker.debian.org/tracker/wireshark

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17084

Trust: 0.1

sources: CNVD: CNVD-2017-30755 // VULMON: CVE-2017-13766 // BID: 100542 // JVNDB: JVNDB-2017-007387 // PACKETSTORM: 145369 // CNNVD: CNNVD-201708-1295 // NVD: CVE-2017-13766

CREDITS

ulf33286

Trust: 0.3

sources: BID: 100542

SOURCES

db:IVDid:0255aa7b-2bd4-4eed-aa31-3973e910869e
db:CNVDid:CNVD-2017-30755
db:VULMONid:CVE-2017-13766
db:BIDid:100542
db:JVNDBid:JVNDB-2017-007387
db:PACKETSTORMid:145369
db:CNNVDid:CNNVD-201708-1295
db:NVDid:CVE-2017-13766

LAST UPDATE DATE

2024-11-23T22:12:58.435000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-30755date:2017-10-20T00:00:00
db:VULMONid:CVE-2017-13766date:2017-12-11T00:00:00
db:BIDid:100542date:2017-08-29T00:00:00
db:JVNDBid:JVNDB-2017-007387date:2017-09-20T00:00:00
db:CNNVDid:CNNVD-201708-1295date:2017-09-07T00:00:00
db:NVDid:CVE-2017-13766date:2024-11-21T03:11:37.520

SOURCES RELEASE DATE

db:IVDid:0255aa7b-2bd4-4eed-aa31-3973e910869edate:2017-10-20T00:00:00
db:CNVDid:CNVD-2017-30755date:2017-10-20T00:00:00
db:VULMONid:CVE-2017-13766date:2017-08-30T00:00:00
db:BIDid:100542date:2017-08-29T00:00:00
db:JVNDBid:JVNDB-2017-007387date:2017-09-20T00:00:00
db:PACKETSTORMid:145369date:2017-12-12T05:29:06
db:CNNVDid:CNNVD-201708-1295date:2017-08-30T00:00:00
db:NVDid:CVE-2017-13766date:2017-08-30T09:29:00.497