Threat Encyclopedia

Wireshark vulnerability wnpa-sec-2013-31

description-logoDescription

It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Analysis

The ETCH dissector could go into a large loop. Discovered by Moshe Kaplan.

affected-products-logoAffected Products

Wireshark

Telemetry

CVE References

CVE-2013-3561