An infinite loop was found in the way Cisco Hot Standby Router Protocol (HSRP) dissector of the Wireshark network traffic analyzer processed certain capture files. If Wireshark read a malformed packet off a network or opened a malicious packet capture file, it could lead to denial of service (Wireshark hang). Reference: Upstream advisory: http://www.wireshark.org/security/wnpa-sec-2012-26.html Bug report: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7581 Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=44454
Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the version of wireshark as shipped with Fedora 16 and Fedora 17.
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 862530]