Wireshark vulnerability wnpa-sec-2016-03

description-logoDescription

It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Analysis

The DNP3 dissector could go into an infinite loop.

affected-products-logoAffected Applications

Wireshark

Version Updates

Date Version Status Detail
2018-04-10 1.00157
Modified
Wireshark
2018-02-15 1.00155
Modified
Wireshark
2017-12-13 1.00152
Modified
Wireshark
2017-07-25 1.00142
Modified
Wireshark