Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6014

Опубликовано: 17 фев. 2017
Источник: debian
EPSS Низкий

Описание

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.2.5+g440fd4d-2package

Примечания

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13416

EPSS

Процентиль: 62%
0.00423
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 9 лет назад

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

CVSS3: 3.3
redhat
почти 9 лет назад

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

CVSS3: 7.5
nvd
почти 9 лет назад

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

CVSS3: 7.5
github
больше 3 лет назад

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

suse-cvrf
почти 9 лет назад

Security update for wireshark

EPSS

Процентиль: 62%
0.00423
Низкий