Learn about CVE-2017-6472 affecting Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10. Find out the impact, affected systems, exploitation mechanism, and mitigation steps.
Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10 were affected by an RTMPT dissector bug causing an infinite loop when triggered by packet injection or corrupted capture files. The issue was resolved by incrementing a specific sequence value.
Understanding CVE-2017-6472
This CVE entry pertains to a vulnerability in Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10 related to the RTMPT dissector.
What is CVE-2017-6472?
The RTMPT dissector in Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10 had a bug causing an infinite loop. This issue could be triggered either by packet injection or by using a corrupted capture file. The problem was resolved by ensuring that a specific sequence value is incremented correctly.
The Impact of CVE-2017-6472
The vulnerability allowed for potential denial of service (DoS) attacks due to the infinite loop, impacting the availability and performance of Wireshark.
Technical Details of CVE-2017-6472
Wireshark vulnerability details and affected systems.
Vulnerability Description
The RTMPT dissector bug in Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10 caused an infinite loop, leading to DoS potential.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability could be exploited by:
Mitigation and Prevention
Steps to mitigate and prevent the CVE-2017-6472 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates