Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | edge-community | noarch | wireshark | < 3.4.4-r0 | UNKNOWN |
Alpine | 3.13-community | noarch | wireshark | < 3.4.4-r0 | UNKNOWN |
Alpine | 3.14-community | noarch | wireshark | < 3.4.4-r0 | UNKNOWN |
Alpine | 3.15-community | noarch | wireshark | < 3.4.4-r0 | UNKNOWN |
Alpine | 3.16-community | noarch | wireshark | < 3.4.4-r0 | UNKNOWN |
Alpine | 3.17-community | noarch | wireshark | < 3.4.4-r0 | UNKNOWN |
Alpine | 3.18-community | noarch | wireshark | < 3.4.4-r0 | UNKNOWN |
Alpine | 3.19-community | noarch | wireshark | < 3.4.4-r0 | UNKNOWN |