The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip \'\\n\' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.
Find out more about CVE-2017-17935 from the MITRE-CVE dictionary and NIST NVD
Login may be required to access defects or downloads.
Product Name | Status | Defect | Fixed | Downloads |
---|