wnpa-sec-2013-11 · HART/IP dissector infinite loop
Summary
Name: HART/IP dissector infinite loop
Docid: wnpa-sec-2013-11
Date: March 6, 2013
Affected versions: 1.8.0 to 1.8.5
Fixed versions: 1.8.6
References: Wireshark bug 8360
CVE-2013-2476
Details
Description
The HART/IP dissectory could go into an infinite loop.
Impact
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 1.8.6 or later.
Go Beyond with Riverbed Technology
I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
- • Rich performance metrics & pre-defined insights for fast problem identification/resolution
- • Modular, flexible solution for deeply-analyzing network & application performance