CVE Vulnerabilities

CVE-2017-7704

Loop with Unreachable Exit Condition ('Infinite Loop')

Published: Apr 12, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.8 HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.

Weakness

The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

Affected Software

NameVendorStart VersionEnd Version
WiresharkWireshark2.2.0 (including)2.2.0 (including)
WiresharkWireshark2.2.1 (including)2.2.1 (including)
WiresharkWireshark2.2.2 (including)2.2.2 (including)
WiresharkWireshark2.2.3 (including)2.2.3 (including)
WiresharkWireshark2.2.4 (including)2.2.4 (including)
WiresharkWireshark2.2.5 (including)2.2.5 (including)
WiresharkUbuntuartful*
WiresharkUbuntubionic*
WiresharkUbuntuesm-apps/bionic*
WiresharkUbuntuesm-apps/xenial*
WiresharkUbuntuesm-infra-legacy/trusty*
WiresharkUbuntuprecise*
WiresharkUbuntutrusty*
WiresharkUbuntutrusty/esm*
WiresharkUbuntuupstream*
WiresharkUbuntuxenial*
WiresharkUbuntuyakkety*
WiresharkUbuntuzesty*

References