Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
References
| Link | Resource |
|---|---|
| https://www.wireshark.org/security/wnpa-sec-2022-01.html | Issue Tracking Vendor Advisory |
| https://gitlab.com/wireshark/wireshark/-/issues/17813 | Exploit Issue Tracking Third Party Advisory |
| https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0586.json | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRJ24JRKLA6XMDKLGVTOPM5KBBU4UHLN/ | |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3DZD2JU56ZI4XV2B3HGVGA5PXQDNA5T/ |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-02-14 22:15
Updated : 2022-02-25 01:15
NVD link : CVE-2022-0586
Mitre link : CVE-2022-0586
JSON object : View
Products Affected
wireshark
- wireshark
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
