The dissectmqrr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "libwireshark-data", "binary_version": "1.10.2-1" }, { "binary_name": "libwireshark-dev", "binary_version": "1.10.2-1" }, { "binary_name": "libwireshark3", "binary_version": "1.10.2-1" }, { "binary_name": "libwiretap-dev", "binary_version": "1.10.2-1" }, { "binary_name": "libwiretap3", "binary_version": "1.10.2-1" }, { "binary_name": "libwsutil-dev", "binary_version": "1.10.2-1" }, { "binary_name": "libwsutil3", "binary_version": "1.10.2-1" }, { "binary_name": "tshark", "binary_version": "1.10.2-1" }, { "binary_name": "wireshark", "binary_version": "1.10.2-1" }, { "binary_name": "wireshark-common", "binary_version": "1.10.2-1" }, { "binary_name": "wireshark-dbg", "binary_version": "1.10.2-1" }, { "binary_name": "wireshark-dev", "binary_version": "1.10.2-1" }, { "binary_name": "wireshark-doc", "binary_version": "1.10.2-1" } ] }