A denial of service flaw was found in the way sFlow dissector of Wireshark, a network traffic analyzer, performed dissection of certain sFlow packet capture files. A remote attacker could provide a specially-crafted sFlow packet / packet capture that, when processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.
Upstream bug report:
Relevant upstream patch:
This issue did NOT affect the versions of the wireshark package, as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the versions of the wireshark package, as shipped with Fedora release of 16 and 17.
Created wireshark tracking bugs for this issue
Affects: fedora-all [bug 881873]
This was assigned CVE-2012-5594:
Not vulnerable. This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
CVE-2012-5594 identifier has been rejected by Mitre in favour of CVE-2012-6054:
** REJECT **
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6054. Reason:
This candidate is a reservation duplicate of CVE-2012-6054. Notes:
All CVE users should reference CVE-2012-6054 instead of this
candidate. All references and descriptions in this candidate have
been removed to prevent accidental usage.
The correct CVE identifier this particular wireshark flaw should be referenced under (from now on) is CVE-2012-6054.