wnpa-sec-2018-39 · DICOM dissector large loop
Summary
Name: DICOM dissector large loop
Docid: wnpa-sec-2018-39
Date: July 18, 2018
Affected versions: 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, 2.2.0 to 2.2.15
Fixed versions: 2.6.2, 2.4.8, 2.2.16
References:
Wireshark bug 14742
CVE-2018-14341
Details
Description
The DICOM dissector could go into a large or infinite loop.
Impact
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 2.6.2, 2.4.8, 2.2.16 or later.
Go Beyond with Riverbed Technology
I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
- • Rich performance metrics & pre-defined insights for fast problem identification/resolution
- • Modular, flexible solution for deeply-analyzing network & application performance