PatchSiren cyber security CVE debrief
CVE-2017-6471 Wireshark CVE debrief
CVE-2017-6471 is a denial-of-service vulnerability in Wireshark’s WSP dissector. According to the CVE record and Wireshark references, malformed capture files or packet injection can trigger an infinite loop in affected versions, preventing normal processing. The issue was addressed by validating the capability length in packet-wsp.c.
- Vendor
- Wireshark
- Product
- CVE-2017-6471
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-04
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-04
- Advisory updated
- 2026-05-13
Who should care
Security teams, incident responders, and analysts who use Wireshark to open untrusted capture files or inspect live traffic should care, especially if they run Wireshark 2.2.0-2.2.4 or 2.0.0-2.0.10. Distributors and administrators managing those versions should also prioritize updates.
Technical summary
The vulnerability is a WSP dissector infinite loop in Wireshark. NVD classifies it as CWE-20 (Improper Input Validation) with a CVSS 3.0 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The impact is availability-only: malformed input or injected packets can cause the dissector to loop indefinitely. Wireshark’s fix was to validate the capability length in epan/dissectors/packet-wsp.c.
Defensive priority
High for environments that routinely process untrusted packet captures or network traffic. Because the issue can be triggered without privileges or user interaction and affects availability, affected deployments should be patched promptly.
Recommended defensive actions
- Upgrade Wireshark to a version outside the affected ranges (2.2.0-2.2.4 and 2.0.0-2.0.10) using the vendor or distribution update path.
- Apply the Wireshark security advisory guidance and any downstream distribution fixes relevant to your platform.
- Treat capture files from untrusted sources as potentially hostile and limit where and how they are opened.
- If you operate analysis infrastructure, monitor for repeated parser hangs or worker process stalls and isolate impacted systems until patched.
Evidence notes
This debrief is based only on the supplied NVD record and referenced official/vendor sources. The CVE published date used for timing context is 2017-03-04. NVD lists affected Wireshark ranges, CWE-20, the CVSS vector, and references to the Wireshark bug tracker, vendor advisory, and code commit that fixed the issue. No exploit steps or reproduction details are included.
Official resources
-
CVE-2017-6471 CVE record
CVE.org
-
CVE-2017-6471 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Vendor Advisory
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed on 2017-03-04. NVD record last modified on 2026-05-13; that modified date is record maintenance metadata, not the vulnerability date.