Wireshark netmonrec_comment_destroy Function Denial of Service Vulnerability
A vulnerability in the netmonrec_comment_destroy function of Wireshark could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.
The vulnerability is due to improper memory operations that are performed by the affected software when the netmonrec_comment_destroy function, as defined in the wiretap/netmon.c source code file of the affected software, is used. An attacker could exploit this vulnerability to cause the affected software to stop functioning, resulting in a DoS condition on the targeted system.
Wireshark has confirmed the vulnerability and released a software patch.
-
To exploit this vulnerability, the attacker may need access to trusted or internal networks to submit crafted source code to the targeted system. This access requirement could reduce the likelihood of a successful exploit.
-
Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Administrators are advised to monitor affected systems.
-
Wireshark has released a git commit at the following link: netmon: Initialize struct netmonrec_comment on alloc
-
-
Wireshark has released a software patch at the following link: Wireshark patch
-

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.