In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2.2.0"
},
{
"last_affected": "2.2.1"
},
{
"last_affected": "2.2.2"
},
{
"last_affected": "2.2.3"
},
{
"last_affected": "2.2.4"
},
{
"last_affected": "2.2.5"
}
],
"cpe": [
"cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.2.5:*:*:*:*:*:*:*"
]
}