{"id":"CVE-2017-6014","details":"In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.","modified":"2026-04-16T06:15:17.499680901Z","published":"2017-02-17T07:59:00.967Z","related":["SUSE-SU-2017:1174-1","SUSE-SU-2017:1442-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201706-12"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3811"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/96284"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13416"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"0"},{"last_affected":"cc3dc1b648d341a489fb95faef3795d8cb2b6192"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.2.4"}]}}],"versions":["2.2.1rc0","backups/ethereal@18706","ethereal-0-3-15","ethereal-0.3.15","start","v1.11.0","v1.11.0-rc1","v1.11.1","v1.11.1-rc1","v1.11.2","v1.11.2-rc1","v1.11.3","v1.11.3-rc1","v1.11.4-rc1","v1.99.0","v1.99.0-rc1","v1.99.1","v1.99.10rc0","v1.99.1rc0","v1.99.2","v1.99.2rc0","v1.99.3","v1.99.3rc0","v1.99.4","v1.99.4rc0","v1.99.5","v1.99.5rc0","v1.99.6","v1.99.6rc0","v1.99.7","v1.99.7rc0","v1.99.8","v1.99.8rc0","v1.99.9","v1.99.9rc0","v2.1.0","v2.1.0rc0","v2.1.1","v2.1.1rc0","v2.1.2rc0","v2.2.0","v2.2.0rc0","v2.2.0rc1","v2.2.0rc2","v2.2.1","v2.2.1rc0","v2.2.2","v2.2.2rc0","v2.2.3","v2.2.3rc0","v2.2.4","v2.2.4rc0","wireshark-1.11.3","wireshark-1.99.0","wireshark-1.99.1","wireshark-1.99.2","wireshark-1.99.3","wireshark-1.99.4","wireshark-1.99.5","wireshark-1.99.6","wireshark-1.99.7","wireshark-1.99.8","wireshark-1.99.9","wireshark-2.1.0","wireshark-2.1.1","wireshark-2.2.0","wireshark-2.2.0rc1","wireshark-2.2.0rc2","wireshark-2.2.1","wireshark-2.2.2","wireshark-2.2.3","wireshark-2.2.4"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-6014.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}