{"id":"CVE-2018-7325","details":"In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.","modified":"2026-05-15T12:03:31.826127002Z","published":"2018-02-23T22:29:00.700Z","related":["SUSE-SU-2018:0811-1","SUSE-SU-2018:0867-1","openSUSE-SU-2024:11513-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}]}]},"references":[{"type":"WEB","url":"https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7be234d06ea39ab6a88115ae41d71060f1f15e3c"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103158"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html"},{"type":"ADVISORY","url":"https://www.wireshark.org/security/wnpa-sec-2018-06.html"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14414"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}