Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-6014

Опубликовано: 16 фев. 2017
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wiresharkWill not fix
Red Hat Enterprise Linux 6wiresharkWill not fix
Red Hat Enterprise Linux 7wiresharkWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-835
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1425375wireshark: Memory exhaustion/infinite loop via malformed STANAG 4607 capture file

EPSS

Процентиль: 62%
0.00423
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 9 лет назад

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

CVSS3: 7.5
nvd
почти 9 лет назад

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

CVSS3: 7.5
debian
почти 9 лет назад

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 cap ...

CVSS3: 7.5
github
больше 3 лет назад

In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.

suse-cvrf
почти 9 лет назад

Security update for wireshark

EPSS

Процентиль: 62%
0.00423
Низкий

3.3 Low

CVSS3