{"id":"USN-4133-1","summary":"Wireshark vulnerabilities","details":"It was discovered that Wireshark improperly handled certain input. A remote or\nlocal attacker could cause Wireshark to crash by injecting malformed packets\nonto the wire or convincing someone to read a malformed packet trace file.\n","modified":"2026-04-22T10:00:29.682511Z","published":"2019-09-16T04:42:49Z","related":["UBUNTU-CVE-2019-12295","UBUNTU-CVE-2019-13619"],"upstream":["CVE-2019-12295","CVE-2019-13619","UBUNTU-CVE-2019-12295","UBUNTU-CVE-2019-13619"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4133-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12295"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-13619"}],"affected":[{"package":{"name":"wireshark","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/wireshark@2.6.10-1~ubuntu16.04.0?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.10-1~ubuntu16.04.0"}]}],"versions":["1.12.7+g7fc8978-1","1.12.8+g5b6e543-2","2.0.1+g59ea380-3build1","2.0.2+ga16e22e-1","2.2.6+g32dac6a-2ubuntu0.16.04","2.6.3-1~ubuntu16.04.1","2.6.4-2~ubuntu16.04.0","2.6.5-1~ubuntu16.04.0","2.6.6-1~ubuntu16.04.0","2.6.8-1~ubuntu16.04.0"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"libwireshark-data"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"libwireshark11"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"libwiretap8"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"libwscodecs2"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"libwsutil9"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"tshark"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"wireshark"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"wireshark-common"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"wireshark-gtk"},{"binary_version":"2.6.10-1~ubuntu16.04.0","binary_name":"wireshark-qt"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4133-1.json","cves_map":{"cves":[{"id":"CVE-2019-12295","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-13619","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"wireshark","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/wireshark@2.6.10-1~ubuntu18.04.0?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.10-1~ubuntu18.04.0"}]}],"versions":["2.4.2-1","2.4.3-1","2.4.4-1","2.4.5-1","2.6.3-1~ubuntu18.04.1","2.6.4-2~ubuntu18.04.0","2.6.5-1~ubuntu18.04.0","2.6.6-1~ubuntu18.04.0","2.6.8-1~ubuntu18.04.0"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"libwireshark-data"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"libwireshark11"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"libwiretap8"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"libwscodecs2"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"libwsutil9"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"tshark"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"wireshark"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"wireshark-common"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"wireshark-gtk"},{"binary_version":"2.6.10-1~ubuntu18.04.0","binary_name":"wireshark-qt"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4133-1.json","cves_map":{"cves":[{"id":"CVE-2019-12295","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2019-13619","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.5"}