In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the NBAP dissector could crash with a large loop that ends with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-nbap.c by prohibiting the self-linking of DCH-IDs.
The product performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 2.2.0 (including) | 2.2.13 (including) |
Wireshark | Wireshark | 2.4.0 (including) | 2.4.5 (including) |
Wireshark | Ubuntu | artful | * |
Wireshark | Ubuntu | bionic | * |
Wireshark | Ubuntu | trusty | * |
Wireshark | Ubuntu | xenial | * |