First published: Fri Jun 02 2017(Updated: )
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.0.0<=2.0.12 | |
Wireshark Wireshark | >=2.2.0<=2.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-9345 is considered medium due to the potential for an infinite loop in the DNS dissector.
To fix CVE-2017-9345, update Wireshark to version 2.2.7 or later, or to version 2.0.13 or later.
CVE-2017-9345 affects Wireshark versions from 2.0.0 to 2.0.12 and from 2.2.0 to 2.2.6.
CVE-2017-9345 is a denial of service vulnerability due to an infinite loop in the DNS dissector.
Yes, CVE-2017-9345 can potentially be exploited remotely through malicious DNS packets.