Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5597

Опубликовано: 25 янв. 2017
Источник: debian

Описание

In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.2.4+gcc3dc1b-1package

Примечания

  • https://www.wireshark.org/security/wnpa-sec-2017-02.html

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13345

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.

CVSS3: 5.9
redhat
около 9 лет назад

In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.

CVSS3: 7.5
nvd
около 9 лет назад

In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.

CVSS3: 7.5
github
больше 3 лет назад

In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.

suse-cvrf
около 9 лет назад

Security update for Wireshark