First published: Tue Jan 08 2019(Updated: )
In Wireshark 2.4.0 to 2.4.11, the ENIP dissector could crash. This was addressed in epan/dissectors/packet-enip.c by changing the memory-management approach so that a use-after-free is avoided.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=2.4.0<=2.4.11 | |
>=2.4.0<=2.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5721 has been classified as moderate severity due to the potential for crashes in Wireshark.
To fix CVE-2019-5721, upgrade Wireshark to version 2.4.12 or later.
Wireshark versions 2.4.0 to 2.4.11 are affected by CVE-2019-5721.
CVE-2019-5721 impacts the ENIP dissector component of Wireshark.
CVE-2019-5721 is a use-after-free vulnerability that could lead to application crashes.