CVE Vulnerabilities

CVE-2024-11596

This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.

This page will reflect the classification results once they are available through NVD.

Any vendor information available is shown as below.

Redhat

wireshark: Buffer Over-read in Wireshark

Mitigation

If the ECMP protocol dissector is not being used, it can be disabled via the “Enabled Protocols” dialog box in the Wireshark GUI application. This will also disable the protocol dissector when using “tshark”, the command line tool. See the links below for instructions to disable a protocol in Wireshark, specifically the “Control Protocol Dissection” section and the “disabled_protos” configuration file option. https://www.wireshark.org/docs/wsug_html_chunked/ChCustProtocolDissectionSection.html https://www.wireshark.org/docs/wsug_html_chunked/ChAppFilesConfigurationSection.html

Ubuntu

ECMP dissector crash in Wireshark 4.4.0 to 4.4.1 and 4.2.0 to 4.2.8 allows denial of service via packet injection or crafted capture file

Affected Software List

Name Vendor Version
Wireshark Ubuntu/focal TBD
Wireshark Ubuntu/jammy TBD
Wireshark Ubuntu/noble TBD
Wireshark Ubuntu/oracular TBD
Wireshark Ubuntu/trusty/esm end of ESM support, was needs-triage
Wireshark Ubuntu/esm-apps/xenial TBD
Wireshark Ubuntu/esm-infra-legacy/trusty TBD
Wireshark Ubuntu/upstream 4.4.2-1
Wireshark Ubuntu/devel TBD
Wireshark Ubuntu/esm-apps/bionic TBD
Wireshark Ubuntu/esm-apps/focal TBD
Wireshark Ubuntu/esm-apps/jammy TBD
Wireshark Ubuntu/esm-apps/noble TBD