The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.12.0 (including) | 1.12.0 (including) |
Wireshark | Ubuntu | lucid | * |
Wireshark | Ubuntu | upstream | * |
Wireshark | Ubuntu | utopic | * |
Red Hat Enterprise Linux 6 | RedHat | wireshark-0:1.8.10-8.el6_6 | * |
Red Hat Enterprise Linux 7 | RedHat | wireshark-0:1.10.3-12.el7_0 | * |