Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9372

Опубликовано: 17 нояб. 2016
Источник: debian
EPSS Низкий

Описание

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.2.2+g9c5aae3-1package
wiresharknot-affectedjessiepackage
wiresharknot-affectedwheezypackage

Примечания

  • https://www.wireshark.org/docs/relnotes/wireshark-2.2.2.html

  • https://www.wireshark.org/security/wnpa-sec-2016-58.html

EPSS

Процентиль: 59%
0.00382
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 9 лет назад

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

CVSS3: 5.9
redhat
около 9 лет назад

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

CVSS3: 5.9
nvd
около 9 лет назад

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

CVSS3: 5.9
github
больше 3 лет назад

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

suse-cvrf
около 9 лет назад

Security update for wireshark

EPSS

Процентиль: 59%
0.00382
Низкий