{"id":"CVE-2017-13765","details":"In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.","modified":"2026-03-20T11:19:20.217397Z","published":"2017-08-30T09:29:00.450Z","related":["SUSE-SU-2017:2555-1","SUSE-SU-2018:0054-1","openSUSE-SU-2024:11513-1"],"references":[{"type":"WEB","url":"https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94666d4357096fc45e3bcad3d9414a14f0831bc8"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/100551"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1039254"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html"},{"type":"ADVISORY","url":"https://www.wireshark.org/security/wnpa-sec-2017-41.html"},{"type":"FIX","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"9a73b827b22c7ce9132e939b9f07ec4425fc2aa6"},{"last_affected":"eceac99e1b7732c93c45c547c27c169a607ddd56"},{"introduced":"5368c50be46d4a44986d12bdfc0a35b42c0f34fc"},{"last_affected":"a9ebe59292ad3a7fff82a95bc528de48b54f9ade"},{"introduced":"0"},{"last_affected":"9be0fa500da594ed01baf3214642838d22811c90"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"last_affected":"2.0.14"},{"introduced":"2.2.0"},{"last_affected":"2.2.8"},{"introduced":"0"},{"last_affected":"2.4.0"}]}}],"versions":["2.2.1rc0","v2.0.0","v2.0.1","v2.0.10","v2.0.10rc0","v2.0.11","v2.0.11rc0","v2.0.12","v2.0.12rc0","v2.0.13","v2.0.13rc0","v2.0.14","v2.0.14rc0","v2.0.1rc0","v2.0.2","v2.0.2rc0","v2.0.3","v2.0.3rc0","v2.0.4","v2.0.4rc0","v2.0.5","v2.0.5rc0","v2.0.6","v2.0.6rc0","v2.0.7","v2.0.7rc0","v2.0.8","v2.0.8rc0","v2.0.9","v2.0.9rc0","v2.2.0","v2.2.1","v2.2.1rc0","v2.2.2","v2.2.2rc0","v2.2.3","v2.2.3rc0","v2.2.4","v2.2.4rc0","v2.2.5","v2.2.5rc0","v2.2.6","v2.2.6rc0","v2.2.7","v2.2.7rc0","v2.2.8","v2.2.8rc0","wireshark-2.0.0","wireshark-2.0.1","wireshark-2.0.10","wireshark-2.0.11","wireshark-2.0.12","wireshark-2.0.13","wireshark-2.0.14","wireshark-2.0.2","wireshark-2.0.3","wireshark-2.0.4","wireshark-2.0.5","wireshark-2.0.6","wireshark-2.0.7","wireshark-2.0.8","wireshark-2.0.9","wireshark-2.2.0","wireshark-2.2.1","wireshark-2.2.2","wireshark-2.2.3","wireshark-2.2.4","wireshark-2.2.5","wireshark-2.2.6","wireshark-2.2.7","wireshark-2.2.8"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-13765.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}