Show plain JSON{"affected_release": [{"advisory": "RHSA-2014:0341", "cpe": "cpe:/o:redhat:enterprise_linux:5", "package": "wireshark-0:1.0.15-6.el5_10", "product_name": "Red Hat Enterprise Linux 5", "release_date": "2014-03-31T00:00:00Z"}, {"advisory": "RHSA-2013:1569", "cpe": "cpe:/o:redhat:enterprise_linux:6", "package": "wireshark-0:1.8.10-4.el6", "product_name": "Red Hat Enterprise Linux 6", "release_date": "2013-11-20T00:00:00Z"}], "bugzilla": {"description": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)", "id": "881771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"}, "csaw": false, "cvss": {"cvss_base_score": "4.3", "cvss_scoring_vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "status": "verified"}, "cwe": "CWE-835", "details": ["[REJECTED CVE] An integer overflow vulnerability has been identified in the dissect_iscsi_pdu() function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark. A remote attacker could provide a specially-crafted iSCSI packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file."], "name": "CVE-2012-5598", "public_date": "2012-11-28T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2012-5598\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-5598"], "statement": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6060. Note: All CVE users should reference CVE-2012-6060 instead of this candidate.", "threat_severity": "Low"}