{"id":"CVE-2017-5597","details":"In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.","modified":"2026-03-15T22:16:51.227598Z","published":"2017-01-25T21:59:00.183Z","related":["SUSE-SU-2017:1174-1","SUSE-SU-2017:1442-1","openSUSE-SU-2024:11513-1"],"references":[{"type":"WEB","url":"https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=57894f741f7cc98b46c9fdce7eee8256d2a4ae3f"},{"type":"WEB","url":"http://www.securityfocus.com/bid/95798"},{"type":"WEB","url":"http://www.securitytracker.com/id/1037694"},{"type":"ADVISORY","url":"https://www.wireshark.org/security/wnpa-sec-2017-02.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3811"},{"type":"FIX","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13345"},{"type":"FIX","url":"https://code.wireshark.org/review/#/c/19747/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"0"},{"last_affected":"9a73b827b22c7ce9132e939b9f07ec4425fc2aa6"},{"introduced":"0"},{"last_affected":"59ea380c69dca2bc2f97fa97c1bf410bbcd2411c"},{"introduced":"0"},{"last_affected":"a16e22ed9cbbc599fe8b7b8e40a6696a0138c489"},{"introduced":"0"},{"last_affected":"eed34f0ac6696c053585ddf75c5805b3d5b395cf"},{"introduced":"0"},{"last_affected":"dd7746e6f1b034048cd986ca6f44291e712cc1fc"},{"introduced":"0"},{"last_affected":"a3be9c6de540ae1fade63568cc77d928b3c52ef7"},{"introduced":"0"},{"last_affected":"d0e42d78193cfacd1022656cd8dad7fc222e6dbc"},{"introduced":"0"},{"last_affected":"daac0f493f09ff68e194a30bf0f5318db96b99cd"},{"introduced":"0"},{"last_affected":"9af92735baf48cac9779176a9319f6a5c1115cb6"},{"introduced":"0"},{"last_affected":"b2423a12c30165075e9d0d033da7d562e0efc05b"},{"introduced":"0"},{"last_affected":"5368c50be46d4a44986d12bdfc0a35b42c0f34fc"},{"introduced":"0"},{"last_affected":"a6fbd278e2d72ed3524995464c86929b51867802"},{"introduced":"0"},{"last_affected":"775fb085cdfebafa565c5b428f0a130d82dbefcb"},{"introduced":"0"},{"last_affected":"57531cdd46cf170524c1fbbfd2c44132bb36e7c6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.0"},{"introduced":"0"},{"last_affected":"2.0.1"},{"introduced":"0"},{"last_affected":"2.0.2"},{"introduced":"0"},{"last_affected":"2.0.3"},{"introduced":"0"},{"last_affected":"2.0.4"},{"introduced":"0"},{"last_affected":"2.0.5"},{"introduced":"0"},{"last_affected":"2.0.6"},{"introduced":"0"},{"last_affected":"2.0.7"},{"introduced":"0"},{"last_affected":"2.0.8"},{"introduced":"0"},{"last_affected":"2.0.9"},{"introduced":"0"},{"last_affected":"2.2.0"},{"introduced":"0"},{"last_affected":"2.2.1"},{"introduced":"0"},{"last_affected":"2.2.2"},{"introduced":"0"},{"last_affected":"2.2.3"}]}}],"versions":["backups/ethereal@18706","ethereal-0-3-15","ethereal-0.3.15","start","v1.11.0","v1.11.0-rc1","v1.11.1","v1.11.1-rc1","v1.11.2","v1.11.2-rc1","v1.11.3","v1.11.3-rc1","v1.11.4-rc1","v1.99.0","v1.99.0-rc1","v1.99.1","v1.99.10rc0","v1.99.1rc0","v1.99.2","v1.99.2rc0","v1.99.3","v1.99.3rc0","v1.99.4","v1.99.4rc0","v1.99.5","v1.99.5rc0","v1.99.6","v1.99.6rc0","v1.99.7","v1.99.7rc0","v1.99.8","v1.99.8rc0","v1.99.9","v1.99.9rc0","v2.0.0","v2.0.0rc0","v2.0.0rc1","v2.0.0rc2","v2.0.0rc3","v2.1.0","v2.1.0rc0","v2.1.1","v2.1.1rc0","v2.1.2rc0","v2.2.0","v2.2.0rc0","v2.2.0rc1","v2.2.0rc2","wireshark-1.11.3","wireshark-1.99.0","wireshark-1.99.1","wireshark-1.99.2","wireshark-1.99.3","wireshark-1.99.4","wireshark-1.99.5","wireshark-1.99.6","wireshark-1.99.7","wireshark-1.99.8","wireshark-1.99.9","wireshark-2.0.0","wireshark-2.1.0","wireshark-2.1.1","wireshark-2.2.0","wireshark-2.2.0rc1","wireshark-2.2.0rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-5597.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}