Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://www.wireshark.org/security/wnpa-sec-2021-20.html | vendor advisory |
https://gitlab.com/wireshark/wireshark/-/issues/17801 | third party advisory issue tracking exploit |
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5AEK3XTOIOGCGUILUFISMGX54YJXWGJ/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q6XGBKWSQFCVYUN4ZK3O3NJIFP3OAFVT/ | vendor advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://security.gentoo.org/glsa/202210-04 | third party advisory vendor advisory |