epan/dissectors/packet-spice.c in the SPICE dissector in Wireshark 2.x before 2.0.2 mishandles capability data, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
{
"binaries": [
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwireshark-data"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwireshark-dev"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwireshark6"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwireshark6-dbgsym"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwiretap-dev"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwiretap5"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwiretap5-dbgsym"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwsutil-dev"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwsutil6"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "libwsutil6-dbgsym"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "tshark"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "tshark-dbgsym"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark-common"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark-common-dbgsym"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark-dev"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark-doc"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark-gtk"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark-gtk-dbgsym"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark-qt"
},
{
"binary_version": "2.0.2+ga16e22e-1",
"binary_name": "wireshark-qt-dbgsym"
}
],
"availability": "No subscription required"
}