A denial of service flaw was found in the way CLNP dissector of Wireshark, a network traffic analyzer, performed dissection of certain CLNP packet capture files. A remote attacker could provide a specially-crafted CLNP packet / packet capture that, when processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop or crash, when trying to process the crafted packet / packet capture file. Upstream bug report: [1] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7871 Sample packet capture: [2] http://www.wireshark.org/download/automated/captures/fuzz-2012-10-16-23114.pcap Relevant upstream patch: [3] http://anonsvn.wireshark.org/viewvc?view=revision&revision=45646 References: [4] http://www.wireshark.org/security/wnpa-sec-2013-02.html [5] http://www.openwall.com/lists/oss-security/2013/01/31/2
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 906387]
Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.