Wireshark vulnerability wnpa-sec-2015-15

description-logoDescription

It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Analysis

The X11 dissector could leak memory.

affected-products-logoAffected Applications

Wireshark

Version Updates

Date Version Status Detail
2020-04-02 1.00068
Modified
Wireshark
2019-09-04 1.00061
Modified
Wireshark