{"id":"CVE-2017-6472","details":"In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.","modified":"2026-05-18T05:49:40.423705165Z","published":"2017-03-04T03:59:00.350Z","related":["openSUSE-SU-2024:11513-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"8.0"}],"vendor_product":"debian:debian_linux","source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3811"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/96571"},{"type":"ADVISORY","url":"https://www.wireshark.org/security/wnpa-sec-2017-04.html"},{"type":"FIX","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"9a73b827b22c7ce9132e939b9f07ec4425fc2aa6"},{"last_affected":"0ad795bc8c4e98c9cd49b5609df19ccce2640666"},{"introduced":"5368c50be46d4a44986d12bdfc0a35b42c0f34fc"},{"last_affected":"cc3dc1b648d341a489fb95faef3795d8cb2b6192"}],"database_specific":{"extracted_events":[{"introduced":"2.0.0"},{"last_affected":"2.0.10"},{"introduced":"2.2.0"},{"last_affected":"2.2.4"}],"cpe":"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["wireshark-2.0.10","v2.0.10","wireshark-2.2.4","v2.2.4","v2.0.10rc0","v2.2.4rc0","wireshark-2.0.9","v2.0.9","wireshark-2.2.3","v2.2.3","v2.2.3rc0","wireshark-2.2.2","v2.2.2","v2.0.9rc0","wireshark-2.0.8","v2.0.8","v2.2.2rc0","v2.0.8rc0","wireshark-2.0.7","v2.0.7","wireshark-2.2.1","v2.2.1","v2.0.7rc0","wireshark-2.0.6","v2.0.6","v2.2.1rc0","2.2.1rc0","wireshark-2.2.0","v2.2.0","v2.0.6rc0","wireshark-2.0.5","v2.0.5","v2.0.5rc0","wireshark-2.0.4","v2.0.4","v2.0.4rc0","wireshark-2.0.3","v2.0.3","v2.0.3rc0","wireshark-2.0.2","v2.0.2","v2.0.2rc0","wireshark-2.0.1","v2.0.1","v2.0.1rc0","wireshark-2.0.0","v2.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6472.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"9a73b827b22c7ce9132e939b9f07ec4425fc2aa6"},{"last_affected":"0ad795bc8c4e98c9cd49b5609df19ccce2640666"},{"introduced":"5368c50be46d4a44986d12bdfc0a35b42c0f34fc"},{"last_affected":"cc3dc1b648d341a489fb95faef3795d8cb2b6192"}],"database_specific":{"extracted_events":[{"introduced":"2.0.0"},{"last_affected":"2.0.10"},{"introduced":"2.2.0"},{"last_affected":"2.2.4"}],"cpe":"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["wireshark-2.0.10","v2.0.10","wireshark-2.2.4","v2.2.4","v2.0.10rc0","v2.2.4rc0","wireshark-2.0.9","v2.0.9","wireshark-2.2.3","v2.2.3","v2.2.3rc0","wireshark-2.2.2","v2.2.2","v2.0.9rc0","wireshark-2.0.8","v2.0.8","v2.2.2rc0","v2.0.8rc0","wireshark-2.0.7","v2.0.7","wireshark-2.2.1","v2.2.1","v2.0.7rc0","wireshark-2.0.6","v2.0.6","v2.2.1rc0","2.2.1rc0","wireshark-2.2.0","v2.2.0","v2.0.6rc0","wireshark-2.0.5","v2.0.5","v2.0.5rc0","wireshark-2.0.4","v2.0.4","v2.0.4rc0","wireshark-2.0.3","v2.0.3","v2.0.3rc0","wireshark-2.0.2","v2.0.2","v2.0.2rc0","wireshark-2.0.1","v2.0.1","v2.0.1rc0","wireshark-2.0.0","v2.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6472.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}