A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wireshark | < 4.0.11-1~deb12u1 | wireshark_4.0.11-1~deb12u1_all.deb |
Debian | 11 | all | wireshark | < 3.4.10-0+deb11u1 | wireshark_3.4.10-0+deb11u1_all.deb |
Debian | 999 | all | wireshark | < 4.2.5-2 | wireshark_4.2.5-2_all.deb |
Debian | 13 | all | wireshark | < 4.2.5-2 | wireshark_4.2.5-2_all.deb |