ID CVE-2022-3190
Summary Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file
References
Vulnerable Configurations
  • cpe:2.3:a:wireshark:wireshark:3.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:3.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:3.6.2:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-835
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 14-09-2022 - 22:34
Published 13-09-2022 - 15:15
Last modified 14-09-2022 - 22:34
Back to Top