The File_read_line function in epan/wslua/wslua_file.c in Wireshark up to and including 2.2.11 does not properly strip '\n' characters, which allows remote malicious users to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wireshark wireshark |
||
debian debian linux 8.0 |