A Buffer Overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the wsutil/to_str.c, and format_fractional_part_nsecs components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
References
Configurations
History
14 Apr 2025, 12:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* |
|
References | () https://gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78 - Third Party Advisory | |
References | () https://github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/ - Mailing List | |
First Time |
Wireshark
Fedoraproject Fedoraproject fedora Wireshark wireshark |
Information
Published : 2024-02-21 19:15
Updated : 2025-04-14 12:55
NVD link : CVE-2024-24479
Mitre link : CVE-2024-24479
CVE.ORG link : CVE-2024-24479
JSON object : View
Products Affected
wireshark
- wireshark
fedoraproject
- fedora
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')