Improper Handling of Missing Values in Wireshark
CVE-2024-0208

7.5HIGH

Key Information:

Vendor
Wireshark
Status
Vendor
CVE Published:
3 January 2024

Summary

A vulnerability has been identified in multiple versions of Wireshark, specifically versions 4.2.0, as well as earlier versions starting from 3.6.0 up to 3.6.19, and from 4.0.0 up to 4.0.11. This issue is due to a crash in the GVCP dissector, which can be triggered through packet injection or the use of crafted capture files. Such manipulations may lead to a denial of service, which disrupts the operation of the application and can impact users' ability to analyze network traffic effectively. Immediate attention to updating to secure versions is recommended.

Affected Version(s)

Wireshark 4.2.0 < 4.2.1

Wireshark 4.0.0 < 4.0.12

Wireshark 3.6.0 < 3.6.20

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.