CVE-2018-6836
Published: 8 February 2018
The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Priority
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 9.8 |
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=28960d79cca262ac6b974f339697b299a1e28fef
- https://code.wireshark.org/review/#/c/25660/
- https://code.wireshark.org/review/#/c/25660/2/wiretap/netmon.c
- https://www.cve.org/CVERecord?id=CVE-2018-6836
- NVD
- Launchpad
- Debian