CVE-2013-1573

Loading...

General

Score:2.9/10.0
Severity:Low
Category:Input Validation Error

Impact Metrics

Confidentiality:None
Integrity:None
Availability:Partial

Exploitability Metrics

Access Vector:Adjacent Network
Access Complexity:Medium
Authentication:None

Relative vulnerabilities

CVE-2012-6052, CVE-2012-6053, CVE-2012-6054, CVE-2012-6055, CVE-2012-6056, CVE-2012-6057, CVE-2012-6058, CVE-2012-6059, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062, CVE-2013-1572, CVE-2013-1574, CVE-2013-1575, CVE-2013-1576, CVE-2013-1577, CVE-2013-1578, CVE-2013-1579, CVE-2013-1580, CVE-2013-1581, CVE-2013-1582, CVE-2013-1583, CVE-2013-1584, CVE-2013-1585, CVE-2013-1586, CVE-2013-1587, CVE-2013-1588, CVE-2013-1589, CVE-2013-1590, CVE-2013-2476, CVE-2013-2479, CVE-2013-2482, CVE-2013-2485, CVE-2013-2486, CVE-2013-2487, CVE-2013-4079, CVE-2013-4080, CVE-2013-4927, CVE-2013-4929, CVE-2013-4931, CVE-2013-5719, CVE-2013-5721, CVE-2013-6339, CVE-2013-7112, CVE-2015-6243, CVE-2015-6246, CVE-2015-6248, CVE-2016-4006, CVE-2016-4079, CVE-2016-4080, CVE-2016-4081, CVE-2016-4082, CVE-2016-4085

Published on 03/02/13 - Updated on 19/09/17

Description

The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.

Category: Input Validation Error

CWE-20 (Input Validation)
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

Security Notices

US National Vulnerability DatabaseCVE-2013-1573
Debian LTSDLA-497-1
SUSE SUSE-SU-2013:0322

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
wiresharkwireshark

Share this vulnerability with:

Twitter Facebook LinkedIn Mail