Wireshark vulnerability wnpa-sec-2015-10

description-logoDescription

It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Analysis

The TNEF dissector could go into an infinite loop. Discovered by Vlad Tsyrklevich.

affected-products-logoAffected Applications

Wireshark

CVE References

CVE-2015-2191