Summary
Name: WBXML dissector infinite loop
Docid: wnpa-sec-2017-13
Date: April 12, 2017
Affected versions: 2.2.0 to 2.2.7, 2.0.0 to 2.0.13
Fixed versions: 2.2.8, 2.0.14
References:
Wireshark bug 13477
Wireshark bug 13796
CVE-2017-7702
CVE-2017-11410
Details
Description
The WBXML dissector could go into an infinite loop. Discovered by Otto Airamo and Antti Levomäki, Forcepoint.
Impact
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 2.2.8, 2.0.14 or later.
Update: July 18, 2017
Updated for Wireshark 2.2.8 and 2.0.14. Added bug 13796.I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
- • Rich performance metrics & pre-defined insights for fast problem identification/resolution
- • Modular, flexible solution for deeply-analyzing network & application performance