Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file
The product performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.
Link | Tags |
---|---|
https://www.wireshark.org/security/wnpa-sec-2022-02.html | exploit vendor advisory |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0585.json | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRJ24JRKLA6XMDKLGVTOPM5KBBU4UHLN/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3DZD2JU56ZI4XV2B3HGVGA5PXQDNA5T/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00041.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202210-04 | third party advisory vendor advisory |