CVE Vulnerabilities

CVE-2017-6472

Loop with Unreachable Exit Condition ('Infinite Loop')

Published: Mar 04, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.

Weakness

The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

Affected Software

NameVendorStart VersionEnd Version
WiresharkWireshark2.0.0 (including)2.0.10 (including)
WiresharkWireshark2.2.0 (including)2.2.4 (including)
WiresharkUbuntuesm-apps/xenial*
WiresharkUbuntuesm-infra-legacy/trusty*
WiresharkUbuntuprecise*
WiresharkUbuntutrusty*
WiresharkUbuntutrusty/esm*
WiresharkUbuntuupstream*
WiresharkUbuntuxenial*
WiresharkUbuntuyakkety*
WiresharkUbuntuzesty*

References