logo
DATABASE RESOURCES PRICING ABOUT US

KLA11201 Multiple vulnerabilities in Wireshark

Description

### *Detect date*: 02/23/2018 ### *Severity*: Warning ### *Description*: Multiple serious vulnerabilities have been found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service. ### *Affected products*: Wireshark 2.4.x earlier than 2.4.5 Wireshark 2.2.x earlier than 2.2.13 ### *Solution*: Update to the latest version [Get Wireshark](<https://www.wireshark.org/download.html>) ### *Original advisories*: [WNPA-SEC-2018-13](<https://www.wireshark.org/security/wnpa-sec-2018-13.html>) [WNPA-SEC-2018-11](<https://www.wireshark.org/security/wnpa-sec-2018-11.html>) [WNPA-SEC-2018-09](<https://www.wireshark.org/security/wnpa-sec-2018-09.html>) [WNPA-SEC-2018-08](<https://www.wireshark.org/security/wnpa-sec-2018-08.html>) [WNPA-SEC-2018-06](<https://www.wireshark.org/security/wnpa-sec-2018-06.html>) [WNPA-SEC-2018-12](<https://www.wireshark.org/security/wnpa-sec-2018-12.html>) [WNPA-SEC-2018-10](<https://www.wireshark.org/security/wnpa-sec-2018-10.html>) [WNPA-SEC-2018-14](<https://www.wireshark.org/security/wnpa-sec-2018-14.html>) [WNPA-SEC-2018-05](<https://www.wireshark.org/security/wnpa-sec-2018-05.html>) [WNPA-SEC-2018-07](<https://www.wireshark.org/security/wnpa-sec-2018-07.html>) ### *Impacts*: DoS ### *Related products*: [Wireshark](<https://threats.kaspersky.com/en/product/Wireshark/>) ### *CVE-IDS*: [CVE-2018-7324](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324>)5.0Critical [CVE-2018-7325](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325>)5.0Critical [CVE-2018-7326](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326>)5.0Critical [CVE-2018-7327](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327>)5.0Critical [CVE-2018-7328](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328>)5.0Critical [CVE-2018-7329](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329>)5.0Critical [CVE-2018-7330](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330>)5.0Critical [CVE-2018-7331](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331>)5.0Critical [CVE-2018-7332](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332>)5.0Critical [CVE-2018-7333](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333>)5.0Critical [CVE-2018-7334](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334>)5.0Critical [CVE-2018-7335](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335>)5.0Critical [CVE-2018-7336](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336>)5.0Critical [CVE-2018-7337](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7337>)5.0Critical [CVE-2018-7320](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320>)5.0Critical [CVE-2018-7321](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321>)5.0Critical [CVE-2018-7322](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322>)5.0Critical [CVE-2018-7323](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323>)5.0Critical


Related