wnpa-sec-2017-04 · RTMPT dissector infinite loop
Summary
Name: RTMPT dissector infinite loop
Docid: wnpa-sec-2017-04
Date: March 3, 2017
Affected versions: 2.2.0 to 2.2.4, 2.0.0 to 2.0.10
Fixed versions: 2.2.5, 2.0.11
References:
Wireshark bug 13347
CVE-2017-6472
Details
Description
The RTMPT dissector could go into an infinite loop and consume memory. Discovered by Antti Levomäki and Christian Jalio, Forcepoint.
Impact
It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 2.2.5, 2.0.11 or later.
Go Beyond with Riverbed Technology
I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
- • Rich performance metrics & pre-defined insights for fast problem identification/resolution
- • Modular, flexible solution for deeply-analyzing network & application performance