Hide Forgot
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. External Referencies: https://www.wireshark.org/security/wnpa-sec-2019-13.html Upstream bug(s): https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1697953]
Upstream patch: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f273ecd5d94f0c39d1683ed147656daee3ef799b
Statement: This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 8 as they did not include support for Ruby Marshal Object (RBM).
An infinite loop in the Rbm dissector is possible when a malformed packet is read on the wire or analyzed from a trace file.
External References: https://www.wireshark.org/security/wnpa-sec-2019-13.html