wnpa-sec-2016-38 · WBXML infinite loop
Summary
Name: WBXML infinite loop
Docid: wnpa-sec-2016-38
Date: June 7, 2016
Affected versions: 1.12.0 to 1.12.11
Fixed versions: 1.12.12
References:
Wireshark bug 12408
CVE-2016-5359
Details
Description
The WBXML dissector could go into an infinite loop. Discovered by Chris Benedict, Aurelien Delaitre, NIST SAMATE Project.
Impact
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 1.12.12 or later.
Go Beyond with Riverbed Technology
I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
- • Rich performance metrics & pre-defined insights for fast problem identification/resolution
- • Modular, flexible solution for deeply-analyzing network & application performance