CVE-2019-10896

7.5 HIGH

📋 TL;DR

CVE-2019-10896 is a denial-of-service vulnerability in Wireshark's DOF dissector that could cause the application to crash when processing specially crafted packets. This affects Wireshark users analyzing network traffic containing DOF protocol data. The vulnerability allows remote attackers to disrupt packet analysis operations.

💻 Affected Systems

Products:
  • Wireshark
Versions: 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0
Operating Systems: All platforms running affected Wireshark versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when analyzing packets using the DOF (Distributed Object Facility) dissector. Users must be actively analyzing network traffic containing DOF protocol data.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete crash of Wireshark during packet analysis, potentially causing loss of ongoing network monitoring or forensic investigation data.

🟠

Likely Case

Application crash requiring restart, interrupting network analysis sessions and potentially causing data loss from unsaved captures.

🟢

If Mitigated

Minimal impact if Wireshark is not used to analyze DOF protocol traffic or if the vulnerable dissector is disabled.

🌐 Internet-Facing: LOW - Wireshark is typically not an internet-facing service but a desktop analysis tool.
🏢 Internal Only: MEDIUM - Internal network analysts using Wireshark could have their analysis sessions disrupted by crafted packets on monitored networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the attacker to inject specially crafted DOF packets into network traffic being analyzed. The bug report includes crash details that could facilitate exploit development.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in Wireshark 2.4.14, 2.6.8, and 3.0.1

Vendor Advisory: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617

Restart Required: Yes

Instructions:

1. Download latest patched version from wireshark.org. 2. Uninstall old version. 3. Install new version. 4. Restart system if prompted.

🔧 Temporary Workarounds

Disable DOF dissector

all

Prevent Wireshark from parsing DOF protocol packets by disabling the dissector

In Wireshark: Analyze -> Enabled Protocols -> Uncheck 'DOF'

Use capture filters

all

Filter out DOF traffic from being captured

Use capture filter: not port 65000 (common DOF port)

🧯 If You Can't Patch

  • Disable the DOF dissector in Wireshark protocol settings
  • Implement network segmentation to limit exposure to potentially malicious DOF traffic

🔍 How to Verify

Check if Vulnerable:

Check Wireshark version: Help -> About Wireshark. If version is 2.4.0-2.4.13, 2.6.0-2.6.7, or exactly 3.0.0, you are vulnerable.

Check Version:

wireshark --version (Linux) or check About dialog (Windows)

Verify Fix Applied:

Verify Wireshark version is 2.4.14+, 2.6.8+, or 3.0.1+. Test with sample DOF traffic to ensure no crashes.

📡 Detection & Monitoring

Log Indicators:

  • Wireshark crash logs
  • Application error events in system logs

Network Indicators:

  • Unusual DOF protocol traffic patterns
  • Malformed DOF packets

SIEM Query:

EventID: 1000 OR EventID: 1001 AND ProcessName: wireshark.exe

🔗 References

📤 Share & Export