Wireshark netmonrec_comment_destroy Function Denial of Service Vulnerability

A vulnerability in the netmonrec_comment_destroy function of Wireshark could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

The vulnerability is due to improper memory operations that are performed by the affected software when the netmonrec_comment_destroy function, as defined in the wiretap/netmon.c source code file of the affected software, is used. An attacker could exploit this vulnerability to cause the affected software to stop functioning, resulting in a DoS condition on the targeted system.

Wireshark has confirmed the vulnerability and released a software patch.

Analysis
  • To exploit this vulnerability, the attacker may need access to trusted or internal networks to submit crafted source code to the targeted system. This access requirement could reduce the likelihood of a successful exploit.
Safeguards
  • Administrators are advised to apply the appropriate updates.

    Administrators are advised to allow only trusted users to have network access.

    Administrators are advised to monitor affected systems.

Vendor Announcements
Fixed Software
    • Wireshark has released a software patch at the following link: Wireshark patch




Image result for wireshark logo

Duncan is a technology professional with over 20 years experience of working in various IT roles. He also has a wide range of other skills in radio, electronics and telecommunications.

Duncan Newell

Duncan is a technology professional with over 20 years experience of working in various IT roles. He also has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: