An issue in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the packet-bgp.c, dissect_bgp_open(tvbuff_ttvb, proto_treetree, packet_info*pinfo), optlen components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that causes less memory to be allocated than expected, leading to a buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Ubuntu | bionic | * |
Wireshark | Ubuntu | mantic | * |
Wireshark | Ubuntu | trusty | * |
Wireshark | Ubuntu | xenial | * |