In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
References
Link Resource
http://www.debian.org/security/2017/dsa-3811 Third Party Advisory
http://www.securityfocus.com/bid/96284 Third Party Advisory VDB Entry
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13416 Issue Tracking Vendor Advisory
https://security.gentoo.org/glsa/201706-12 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-02-17T07:45:00

Updated: 2017-11-03T18:57:01

Reserved: 2017-02-16T00:00:00


Link: CVE-2017-6014

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-02-17T07:59:00.967

Modified: 2019-10-03T00:03:26.223


Link: CVE-2017-6014

JSON object: View

cve-icon Redhat Information

No data.

CWE