CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
74.1%
The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wireshark | < 1.8.6-1 | wireshark_1.8.6-1_all.deb |
Debian | 11 | all | wireshark | < 1.8.6-1 | wireshark_1.8.6-1_all.deb |
Debian | 999 | all | wireshark | < 1.8.6-1 | wireshark_1.8.6-1_all.deb |
Debian | 13 | all | wireshark | < 1.8.6-1 | wireshark_1.8.6-1_all.deb |