First published: Fri Feb 23 2018(Updated: )
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.2.0<=2.2.12 | |
Wireshark Wireshark | >=2.4.0<=2.4.4 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7331 is classified as a medium severity vulnerability due to its potential to cause an infinite loop in the Wireshark application.
To fix CVE-2018-7331, update Wireshark to version 2.4.5 or 2.2.13 or later, where the issue has been addressed.
CVE-2018-7331 affects Wireshark versions 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12.
Yes, CVE-2018-7331 can affect Debian GNU/Linux 8.0 users running the vulnerable versions of Wireshark.
CVE-2018-7331 is a denial of service vulnerability that occurs due to an infinite loop caused by improper validation of packet length.