Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7333

Опубликовано: 23 фев. 2018
Источник: debian
EPSS Низкий

Описание

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.4.5-1package
wiresharknot-affectedjessiepackage
wiresharknot-affectedwheezypackage

Примечания

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14449

  • https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=bd6313181317bfe83842b27650b65f3c2b8d5dc9

  • https://www.wireshark.org/security/wnpa-sec-2018-06.html

EPSS

Процентиль: 57%
0.00355
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.

CVSS3: 7.5
nvd
почти 8 лет назад

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.

CVSS3: 7.5
github
больше 3 лет назад

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.

suse-cvrf
почти 8 лет назад

Security update for wireshark

suse-cvrf
почти 8 лет назад

Security update for wireshark

EPSS

Процентиль: 57%
0.00355
Низкий