CVE-2019-12295

In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting recursion.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 76%
VendorProductVersion
wiresharkwireshark
2.4.0 ≤
𝑥
≤ 2.4.14
wiresharkwireshark
2.6.0 ≤
𝑥
≤ 2.6.8
wiresharkwireshark
3.0.0 ≤
𝑥
≤ 3.0.1
debiandebian_linux
9.0
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.04
f5big-ip_access_policy_manager
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_access_policy_manager
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_access_policy_manager
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_access_policy_manager
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_access_policy_manager
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_access_policy_manager
15.1.0
f5big-ip_advanced_firewall_manager
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_advanced_firewall_manager
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_advanced_firewall_manager
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_advanced_firewall_manager
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_advanced_firewall_manager
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_advanced_firewall_manager
15.1.0
f5big-ip_analytics
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_analytics
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_analytics
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_analytics
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_analytics
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_analytics
15.1.0
f5big-ip_application_acceleration_manager
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_application_acceleration_manager
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_application_acceleration_manager
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_application_acceleration_manager
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_application_acceleration_manager
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_application_acceleration_manager
15.1.0
f5big-ip_application_security_manager
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_application_security_manager
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_application_security_manager
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_application_security_manager
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_application_security_manager
15.1.0
f5big-ip_domain_name_system
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_domain_name_system
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_domain_name_system
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_domain_name_system
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_domain_name_system
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_domain_name_system
15.1.0
f5big-ip_edge_gateway
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_edge_gateway
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_edge_gateway
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_edge_gateway
14.1.0 ≤
𝑥
< 14.1.2
f5big-ip_edge_gateway
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_edge_gateway
15.1.0
f5big-ip_fraud_protection_service
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_fraud_protection_service
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_fraud_protection_service
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_fraud_protection_service
14.1.0 ≤
𝑥
< 14.1.2
f5big-ip_fraud_protection_service
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_fraud_protection_service
15.1.0
f5big-ip_global_traffic_manager
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_global_traffic_manager
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_global_traffic_manager
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_global_traffic_manager
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_global_traffic_manager
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_global_traffic_manager
15.1.0
f5big-ip_link_controller
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_link_controller
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_link_controller
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_link_controller
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_link_controller
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_link_controller
15.1.0
f5big-ip_local_traffic_manager
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_local_traffic_manager
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_local_traffic_manager
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_local_traffic_manager
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_local_traffic_manager
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_local_traffic_manager
15.1.0
f5big-ip_policy_enforcement_manager
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_policy_enforcement_manager
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_policy_enforcement_manager
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_policy_enforcement_manager
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_policy_enforcement_manager
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_policy_enforcement_manager
15.1.0
f5big-ip_webaccelerator
12.1.3.6 ≤
𝑥
< 12.1.5.3
f5big-ip_webaccelerator
13.1.1.2 ≤
𝑥
< 13.1.3.5
f5big-ip_webaccelerator
14.0.0.3 ≤
𝑥
≤ 14.0.1
f5big-ip_webaccelerator
14.1.0 ≤
𝑥
< 14.1.2.8
f5big-ip_webaccelerator
15.0.0 ≤
𝑥
≤ 15.0.1
f5big-ip_webaccelerator
15.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wireshark
bullseye
3.4.10-0+deb11u1
fixed
jessie
postponed
bullseye (security)
3.4.16-0+deb11u1
fixed
bookworm
4.0.11-1~deb12u1
fixed
bookworm (security)
4.0.11-1~deb12u1
fixed
trixie
4.4.0-1
fixed
sid
4.4.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
wireshark
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
not-affected
disco
Fixed 2.6.10-1~ubuntu19.04.0
released
cosmic
ignored
bionic
Fixed 2.6.10-1~ubuntu18.04.0
released
xenial
Fixed 2.6.10-1~ubuntu16.04.0
released
trusty
Fixed 2.6.10-1~ubuntu14.04.0~esm1
released