3.6 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
6.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.4%
Wireshark is vulnerable to Use After Free. The vulnerability is caused due to an incorrect use of dynamic memory during program operation which can cause a Denial Of Service (DOS) via crafted capture file.
gitlab.com/wireshark/wireshark/-/issues/19782
gitlab.com/wireshark/wireshark/-/issues/19783
gitlab.com/wireshark/wireshark/-/issues/19784
lists.fedoraproject.org/archives/list/[email protected]/message/66H2BSENPSIALF2WIZF7M3QBVWYBMFGW/
lists.fedoraproject.org/archives/list/[email protected]/message/7MKFJAZDKXGFFQPRDYLX2AANRNMYZZEZ/
security-tracker.debian.org/tracker/CVE-2024-4855
www.wireshark.org/security/wnpa-sec-2024-08.html
3.6 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
6.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.4%