A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
References
Configurations
No configuration.
History
22 Aug 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-119 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
23 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Feb 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected. |
22 Feb 2024, 19:07
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Feb 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-21 19:15
Updated : 2024-08-22 18:35
NVD link : CVE-2024-24476
Mitre link : CVE-2024-24476
CVE.ORG link : CVE-2024-24476
JSON object : View
Products Affected
No product.
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer