|Description||In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding validation of the relationships between indexes and lengths. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-7702.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
Vulnerable and fixed packages
The table below lists information on source packages.
|wireshark (PTS)||stretch (security), stretch||2.6.7-1~deb9u1||fixed|
The information below is based on the following data on fixed versions.
[jessie] - wireshark <not-affected> (Incomplete fix for CVE-2017-7702 not applied)
[wheezy] - wireshark <not-affected> (Incomplete fix for CVE-2017-7702 not applied)