First published: Fri Feb 23 2018(Updated: )
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.2.0<=2.2.12 | |
Wireshark Wireshark | >=2.4.0<=2.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7326 is considered a moderate severity vulnerability due to its potential to cause an infinite loop in Wireshark.
To fix CVE-2018-7326, update Wireshark to version 2.4.5 or later for the 2.4.x series and version 2.2.13 or later for the 2.2.x series.
Wireshark versions 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12 are affected by CVE-2018-7326.
CVE-2018-7326 is a logic flaw vulnerability that leads to an infinite loop during packet dissection.
Users of Wireshark versions specified in CVE-2018-7326 are impacted, particularly those analyzing network traffic.