An infinite loop was found in the way Distributed Relational Database Architecture (DRDA) dissector of the Wireshark network traffic analyzer processed certain capture files. If Wireshark read a malformed packet off a network or opened a malicious packet capture file, it could lead to denial of service (Wireshark hang). References: Upstream advisory: http://www.wireshark.org/security/wnpa-sec-2012-28.html Bug report: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7666 Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=44749
Statement: This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the version of wireshark as shipped with Fedora 16 and Fedora 17.
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 862530]
*** This bug has been marked as a duplicate of bug 849926 ***