DISPUTED A Buffer Overflow in Wireshark before 4.2.0 allows a remote
attacker to cause a denial of service via the wsutil/to_str.c, and
format_fractional_part_nsecs components. NOTE: this is disputed by the
vendor because neither release 4.2.0 nor any other release was affected.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | wireshark | < any | UNKNOWN |
ubuntu | 20.04 | noarch | wireshark | < any | UNKNOWN |
ubuntu | 22.04 | noarch | wireshark | < any | UNKNOWN |
ubuntu | 23.10 | noarch | wireshark | < any | UNKNOWN |
ubuntu | 24.04 | noarch | wireshark | < any | UNKNOWN |
ubuntu | 14.04 | noarch | wireshark | < any | UNKNOWN |
ubuntu | 16.04 | noarch | wireshark | < any | UNKNOWN |
gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78
github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd
launchpad.net/bugs/cve/CVE-2024-24479
nvd.nist.gov/vuln/detail/CVE-2024-24479
security-tracker.debian.org/tracker/CVE-2024-24479
www.cve.org/CVERecord?id=CVE-2024-24479