CVE-2017-7705

Publication date 12 April 2017

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.

Status

Package Ubuntu Release Status
wireshark 18.04 LTS bionic
Fixed 2.6.3-1~ubuntu18.04.1
17.10 artful
Fixed 2.2.6+g32dac6a-2
17.04 zesty
Fixed 2.2.6+g32dac6a-2ubuntu0.17.04
16.10 yakkety
Fixed 2.2.6+g32dac6a-2ubuntu0.16.10
16.04 LTS xenial
Fixed 2.6.3-1~ubuntu16.04.1
14.04 LTS trusty
Fixed 2.6.3-1~ubuntu14.04.1
12.04 LTS precise Ignored end of life

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H