epan/dissectors/packet-spice.c in the SPICE dissector in Wireshark 2.x before 2.0.2 mishandles capability data, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
{
"binaries": [
{
"binary_name": "libwireshark-data",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwireshark-dev",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwireshark6",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwireshark6-dbgsym",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwiretap-dev",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwiretap5",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwiretap5-dbgsym",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwsutil-dev",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwsutil6",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "libwsutil6-dbgsym",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "tshark",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "tshark-dbgsym",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark-common",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark-common-dbgsym",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark-dev",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark-doc",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark-gtk",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark-gtk-dbgsym",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark-qt",
"binary_version": "2.0.2+ga16e22e-1"
},
{
"binary_name": "wireshark-qt-dbgsym",
"binary_version": "2.0.2+ga16e22e-1"
}
],
"availability": "No subscription required"
}