wnpa-sec-2017-27 · DICOM dissector infinite loop
Summary
Name: DICOM dissector infinite loop
Docid: wnpa-sec-2017-27
Date: June 1, 2017
Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12
Fixed versions: 2.2.7, 2.0.13
    References: 
      
        
      
Wireshark bug 13685
        
      
      
        
      
CVE-2017-9349
       
      
    
Details
Description
The DICOM dissector could to into an infinite loop. Discovered by the OSS-Fuzz project.
Impact
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 2.2.7, 2.0.13 or later.
Go Beyond with Riverbed Technology
  I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
 - • Rich performance metrics & pre-defined insights for fast problem identification/resolution
 - • Modular, flexible solution for deeply-analyzing network & application performance