Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Debian_linux | Debian | 7.0 (including) | 7.0 (including) |
Debian_linux | Debian | 8.0 (including) | 8.0 (including) |
Red Hat Enterprise Linux 6 | RedHat | wireshark-0:1.8.10-17.el6 | * |
Red Hat Enterprise Linux 7 | RedHat | wireshark-0:1.10.14-7.el7 | * |
Wireshark | Ubuntu | artful | * |
Wireshark | Ubuntu | bionic | * |
Wireshark | Ubuntu | trusty | * |
Wireshark | Ubuntu | upstream | * |
Wireshark | Ubuntu | utopic | * |
Wireshark | Ubuntu | vivid | * |
Wireshark | Ubuntu | wily | * |
Wireshark | Ubuntu | xenial | * |
Wireshark | Ubuntu | yakkety | * |
Wireshark | Ubuntu | zesty | * |