First published: Fri Jun 02 2017(Updated: )
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.0.0<=2.0.12 | |
Wireshark Wireshark | >=2.2.0<=2.2.6 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9349 is classified as a moderate severity vulnerability due to the potential for denial-of-service from the infinite loop.
To fix CVE-2017-9349, upgrade Wireshark to a version later than 2.2.6 or 2.0.12.
CVE-2017-9349 affects Wireshark versions 2.0.0 to 2.0.12 and 2.2.0 to 2.2.6.
Yes, CVE-2017-9349 can be exploited by sending specially crafted DICOM packets to trigger the infinite loop.
CVE-2017-9349 was reported through various security channels, including incident reports from security researchers.