CVE-2017-6014

NameCVE-2017-6014
DescriptionIn Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-826-1, DSA-3811-1
Debian Bugs855408

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wireshark (PTS)bullseye3.4.10-0+deb11u1fixed
bullseye (security)3.4.16-0+deb11u1fixed
bookworm4.0.17-0+deb12u1fixed
bookworm (security)4.0.11-1~deb12u1fixed
trixie4.4.0-1fixed
sid4.4.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wiresharksourcewheezy1.12.1+g01b65bf-4+deb8u6~deb7u6DLA-826-1
wiresharksourcejessie1.12.1+g01b65bf-4+deb8u11DSA-3811-1
wiresharksource(unstable)2.2.5+g440fd4d-2855408

Notes

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13416

Search for package or bug name: Reporting problems