The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | * | 2.4.4 (including) |
Wireshark | Ubuntu | artful | * |
Wireshark | Ubuntu | bionic | * |
Wireshark | Ubuntu | trusty | * |
Wireshark | Ubuntu | xenial | * |
This weakness can take several forms, such as: