4.7 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse accepted
-
@LeSuisse
ignored
maintainer.ignore
2 maintainers
- @fpletz
- @bjornfor
- @LeSuisse published on GitHub
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark
K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
References
Affected products
- <4.4.15
- <4.6.5
Matching in nixpkgs
pkgs.tshark
Powerful network protocol analyzer
pkgs.wireshark
Powerful network protocol analyzer
pkgs.wireshark-qt
Powerful network protocol analyzer
Package maintainers
Ignored maintainers (2)
-
@fpletz Franz Pletz <fpletz@fnordicwalking.de>
-
@bjornfor Bjørn Forsman <bjorn.forsman@gmail.com>