PatchSiren cyber security CVE debrief
CVE-2017-6474 Wireshark CVE debrief
CVE-2017-6474 is a denial-of-service issue in Wiresharkâs NetScaler file parser. A malformed capture file can trigger an infinite loop and cause Wireshark to hang while parsing. The issue was fixed by validating record sizes in the parser.
- Vendor
- Wireshark
- Product
- CVE-2017-6474
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-04
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-04
- Advisory updated
- 2026-05-13
Who should care
Security teams, network analysts, incident responders, and any organization that opens or automates processing of untrusted packet captures with Wireshark. Distribution maintainers and package managers should also confirm patched builds are deployed.
Technical summary
NVD records this issue as CVSS 3.0 7.5 (HIGH) with AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H and CWE-835. A malformed NetScaler capture file can drive wiretap/netscaler.c into an infinite loop. The vendor fix validates record sizes to prevent the parser from getting stuck. Affected versions listed by NVD are Wireshark 2.0.0 through 2.0.10 and 2.2.0 through 2.2.4.
Defensive priority
High for environments that routinely inspect third-party or untrusted capture files; otherwise moderate. The impact is availability-only, but the hang can disrupt analysis workflows and automated processing.
Recommended defensive actions
- Upgrade Wireshark to a fixed release that includes the record-size validation for wiretap/netscaler.c.
- Confirm deployed package versions are outside the affected ranges: 2.0.0-2.0.10 and 2.2.0-2.2.4.
- Treat unknown or untrusted capture files as hostile input and isolate analysis workflows where practical.
- Monitor for parser hangs or stalled analysis jobs when opening NetScaler captures and remove suspect files from routine processing.
- If you rely on distribution packages, verify vendor security updates or backports are applied.
Evidence notes
This debrief is based on the supplied NVD record and linked Wireshark references. The record states the vulnerability is an infinite loop in the NetScaler file parser triggered by a malformed capture file, with the remediation described as validating record sizes in wiretap/netscaler.c. NVD lists CWE-835 and the CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Linked references include the Wireshark bug tracker, vendor advisory, source commit, and third-party advisories.
Official resources
-
CVE-2017-6474 CVE record
CVE.org
-
CVE-2017-6474 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Vendor Advisory
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed on 2017-03-04, with the official record and supporting vendor references pointing to Wireshark advisories and fix details. The published date in this debrief is the CVE publication date supplied in the source corpus.