First published: Fri Feb 23 2018(Updated: )
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.2.0<=2.2.12 | |
Wireshark Wireshark | >=2.4.0<=2.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7321 has been classified as a medium severity vulnerability due to its potential for denial-of-service attacks.
To resolve CVE-2018-7321, upgrade Wireshark to version 2.4.5 or later for the 2.4.x series and to version 2.2.13 or later for the 2.2.x series.
CVE-2018-7321 can cause Wireshark to enter a large loop, potentially leading to performance degradation or crashes.
No, CVE-2018-7321 affects only Wireshark versions 2.4.0 through 2.4.4 and 2.2.0 through 2.2.12.
Check your Wireshark version and determine if it's between the affected ranges to see if you're vulnerable to CVE-2018-7321.