Name: Wireshark RTPS2 dissector buffer overflow
Date: August 15, 2012
Affected versions: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1
Fixed versions: 1.8.2, 1.6.10, 1.4.15
References: Wireshark bug 7568
The RTPS2 dissector could overflow a buffer. Reported by Laurent Butti.
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Upgrade to Wireshark 1.8.2, 1.6.10, 1.4.15 or later.
Riverbed is Wireshark's primary sponsor and provides our funding. They also make great products that fully integrate with Wireshark.
I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
- • Rich performance metrics & pre-defined insights for fast problem identification/resolution
- • Modular, flexible solution for deeply-analyzing network & application performance