Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://www.wireshark.org/security/wnpa-sec-2022-01.html | issue tracking vendor advisory |
https://gitlab.com/wireshark/wireshark/-/issues/17813 | issue tracking exploit third party advisory |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0586.json | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRJ24JRKLA6XMDKLGVTOPM5KBBU4UHLN/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3DZD2JU56ZI4XV2B3HGVGA5PXQDNA5T/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00041.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202210-04 | third party advisory vendor advisory |