Wireshark vulnerability wnpa-sec-2013-20
Description
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Analysis
The FCSP dissector could go into an infinite loop. Discovered by Moshe Kaplan.Affected Applications
Wireshark