CVE-2012-6054Infinite Loop in Wireshark

Severity
5.0MEDIUMNVD
EPSS
0.7%
top 28.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 5
Latest updateMay 17

Description

The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.8.6-1 (bookworm)
Debianwireshark/wireshark< 1.8.6-1+3
NVDwireshark/wireshark4 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-594j-mv6x-7qw2: The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow2022-05-17
OSV
CVE-2012-6054: The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow2012-12-05

📋Vendor Advisories

2
Red Hat
wireshark: DoS (infinite loop) in the sFlow dissector (wnpa-sec-2012-32)2012-11-28
Debian
CVE-2012-6054: wireshark - The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in...2012