In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wireshark | < 2.2.5+g440fd4d-2 | wireshark_2.2.5+g440fd4d-2_all.deb |
Debian | 11 | all | wireshark | < 2.2.5+g440fd4d-2 | wireshark_2.2.5+g440fd4d-2_all.deb |
Debian | 10 | all | wireshark | < 2.2.5+g440fd4d-2 | wireshark_2.2.5+g440fd4d-2_all.deb |
Debian | 999 | all | wireshark | < 2.2.5+g440fd4d-2 | wireshark_2.2.5+g440fd4d-2_all.deb |
Debian | 13 | all | wireshark | < 2.2.5+g440fd4d-2 | wireshark_2.2.5+g440fd4d-2_all.deb |