This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.
This page will reflect the classification results once they are available through NVD.
Any vendor information available is shown as below.
wireshark: Buffer Over-read in Wireshark
If the ECMP protocol dissector is not being used, it can be disabled via the “Enabled Protocols” dialog box in the Wireshark GUI application. This will also disable the protocol dissector when using “tshark”, the command line tool. See the links below for instructions to disable a protocol in Wireshark, specifically the “Control Protocol Dissection” section and the “disabled_protos” configuration file option. https://www.wireshark.org/docs/wsug_html_chunked/ChCustProtocolDissectionSection.html https://www.wireshark.org/docs/wsug_html_chunked/ChAppFilesConfigurationSection.html
ECMP dissector crash in Wireshark 4.4.0 to 4.4.1 and 4.2.0 to 4.2.8 allows denial of service via packet injection or crafted capture file
Name | Vendor | Version |
---|---|---|
Wireshark | Ubuntu/focal | TBD |
Wireshark | Ubuntu/jammy | TBD |
Wireshark | Ubuntu/noble | TBD |
Wireshark | Ubuntu/oracular | TBD |
Wireshark | Ubuntu/trusty/esm | end of ESM support, was needs-triage |
Wireshark | Ubuntu/esm-apps/xenial | TBD |
Wireshark | Ubuntu/esm-infra-legacy/trusty | TBD |
Wireshark | Ubuntu/upstream | 4.4.2-1 |
Wireshark | Ubuntu/devel | TBD |
Wireshark | Ubuntu/esm-apps/bionic | TBD |
Wireshark | Ubuntu/esm-apps/focal | TBD |
Wireshark | Ubuntu/esm-apps/jammy | TBD |
Wireshark | Ubuntu/esm-apps/noble | TBD |