Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
References
Link | Resource |
---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0586.json | Third Party Advisory |
https://gitlab.com/wireshark/wireshark/-/issues/17813 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00041.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRJ24JRKLA6XMDKLGVTOPM5KBBU4UHLN/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3DZD2JU56ZI4XV2B3HGVGA5PXQDNA5T/ | |
https://security.gentoo.org/glsa/202210-04 | Third Party Advisory |
https://www.wireshark.org/security/wnpa-sec-2022-01.html | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
04 Nov 2022, 19:40
Type | Values Removed | Values Added |
---|---|---|
References | (GENTOO) https://security.gentoo.org/glsa/202210-04 - Third Party Advisory |
16 Oct 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Apr 2022, 17:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00041.html - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRJ24JRKLA6XMDKLGVTOPM5KBBU4UHLN/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3DZD2JU56ZI4XV2B3HGVGA5PXQDNA5T/ - Mailing List, Third Party Advisory |
01 Apr 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Feb 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Feb 2022, 18:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 7.5 |
CPE | cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* | |
CWE | CWE-835 | |
References | (CONFIRM) https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0586.json - Third Party Advisory | |
References | (MISC) https://gitlab.com/wireshark/wireshark/-/issues/17813 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://www.wireshark.org/security/wnpa-sec-2022-01.html - Issue Tracking, Vendor Advisory |
14 Feb 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-14 22:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-0586
Mitre link : CVE-2022-0586
CVE.ORG link : CVE-2022-0586
JSON object : View
Products Affected
wireshark
- wireshark
debian
- debian_linux
fedoraproject
- fedora
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')