First published: Fri Feb 18 2022(Updated: )
Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=3.4.0<3.4.12 | |
Wireshark Wireshark | >=3.6.0<3.6.2 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0585 is a vulnerability in Wireshark versions 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 that allows denial of service through packet injection or crafted capture file.
CVE-2022-0585 can result in a denial of service by causing large loops in multiple protocol dissectors.
CVE-2022-0585 has a severity rating of medium (6.5) in the CVSS v3.1 scoring system.
Wireshark versions 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 are affected by CVE-2022-0585.
To mitigate the impact of CVE-2022-0585, update to Wireshark versions 3.6.2 or higher for the 3.6.x branch, or 3.4.12 or higher for the 3.4.x branch.