A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
References
Configurations
History
14 Apr 2025, 12:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wireshark
Fedoraproject Fedoraproject fedora Wireshark wireshark |
|
CPE | cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* |
|
References | () https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b - Third Party Advisory | |
References | () https://github.com/wireshark/wireshark/commit/108217f4bb1afb8b25fc705c2722b3e328b1ad78 - Patch | |
References | () https://gitlab.com/wireshark/wireshark/-/issues/19344 - Issue Tracking, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/ - Mailing List |
Information
Published : 2024-02-21 19:15
Updated : 2025-04-14 12:55
NVD link : CVE-2024-24476
Mitre link : CVE-2024-24476
CVE.ORG link : CVE-2024-24476
JSON object : View
Products Affected
wireshark
- wireshark
fedoraproject
- fedora
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer