ArchLinux: 202004-10: wireshark-cli: arbitrary code execution
Summary
A stack overflow has been found in the fAbstractSyntaxNType function of the BACApp dissector of Wireshark versions prior to 3.2.3, which could be triggered by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to 3.2.3-1.
# pacman -Syu "wireshark-cli>=3.2.3-1"
The problem has been fixed upstream in version 3.2.3.
References
https://www.wireshark.org/security/wnpa-sec-2020-07 https://gitlab.com/wireshark/wireshark/-/issues/16474 https://security.archlinux.org/CVE-2020-11647
Workaround
None.