{ "schema_version": "1.4.0", "id": "GHSA-87f4-45wv-qprf", "modified": "2025-04-20T03:36:01Z", "published": "2022-05-13T01:47:05Z", "aliases": [ "CVE-2017-7702" ], "details": "In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7702" }, { "type": "WEB", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477" }, { "type": "WEB", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2f322f66cbcca2fefdaa630494f9d6c97eb659b7" }, { "type": "WEB", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2f322f66cbcca2fefdaa630494f9d6c97eb659b7" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201706-12" }, { "type": "WEB", "url": "https://www.wireshark.org/security/wnpa-sec-2017-13.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/97633" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1038262" } ], "database_specific": { "cwe_ids": [ "CWE-835" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-04-12T23:59:00Z" } }