5
CVSSv2

CVE-2017-5597

Published: 25/01/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 2.0.0

wireshark wireshark 2.0.4

wireshark wireshark 2.2.0

wireshark wireshark 2.0.9

wireshark wireshark 2.2.2

wireshark wireshark 2.0.1

wireshark wireshark 2.2.1

wireshark wireshark 2.0.7

wireshark wireshark 2.0.2

wireshark wireshark 2.0.8

wireshark wireshark 2.0.3

wireshark wireshark 2.0.6

wireshark wireshark 2.2.3

wireshark wireshark 2.0.5

Vendor Advisories

Debian Bug report logs - #855408 wireshark: CVE-2017-6014: crafted or malformed STANAG 4607 capture file will cause an infinite loop Package: src:wireshark; Maintainer for src:wireshark is Balint Reczey <rbalint@ubuntucom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 17 Feb 2017 15:42:01 UTC Sev ...
It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for ASTERIX, DHCPv6, NetScaler, LDSS, IAX2, WSP, K12 and STANAG 4607, that could lead to various crashes, denial-of-service or execution of arbitrary code For the stable distribution (jessie), these problems have been fixed in version ...
In Wireshark 220 to 223 and 200 to 209, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file This was addressed in epan/dissectors/packet-dhcpv6c by changing a data type to avoid an integer overflow ...