wnpa-sec-2012-32 · Wireshark sFlow dissector infinite loop
Summary
Name: Wireshark sFlow dissector infinite loop
Docid: wnpa-sec-2012-32
Date: November 28, 2012
Affected versions: 1.8.0 to 1.8.3, 1.6.0 to 1.6.13.
Fixed versions: 1.8.4
References: Wireshark bug 7789
CVE-2012-6054
Details
Description
The sFlow dissector could go into an infinite loop.
Impact
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 1.8.4 or later.
Go Beyond with Riverbed Technology
I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
- • Rich performance metrics & pre-defined insights for fast problem identification/resolution
- • Modular, flexible solution for deeply-analyzing network & application performance