Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10 are affected by an infinite loop issue in the WSP protocol, allowing attackers to trigger denial of service attacks. Learn how to mitigate this vulnerability.
Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10 encountered an infinite loop issue in the WSP protocol due to packet injection or malformed capture files. This was addressed by implementing capability length validation.
Understanding CVE-2017-6471
Wireshark vulnerability with an infinite loop issue in the WSP protocol.
What is CVE-2017-6471?
Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10 experienced an infinite loop issue in the WSP protocol due to packet injection or malformed capture files. The problem was resolved by introducing capability length validation in the epan/dissectors/packet-wsp.c file.
The Impact of CVE-2017-6471
Technical Details of CVE-2017-6471
Wireshark vulnerability technical specifics.
Vulnerability Description
The vulnerability in Wireshark versions 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10 allowed for an infinite loop in the WSP protocol, which could be triggered by packet injection or malformed capture files. The issue was mitigated by adding capability length validation in the epan/dissectors/packet-wsp.c file.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability could be exploited by:
Mitigation and Prevention
Protecting systems from CVE-2017-6471.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates