First published: Thu Dec 30 2021(Updated: )
Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=3.4.0<=3.4.10 | |
Wireshark Wireshark | =3.6.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
>=3.4.0<=3.4.10 | ||
=3.6.0 | ||
=34 | ||
=35 | ||
=9.0 | ||
=12.2.1.3.0 | ||
=12.2.1.4.0 | ||
=8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4184 is an infinite loop vulnerability in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 that allows denial of service through packet injection or crafted capture file.
CVE-2021-4184 allows an attacker to cause a denial of service in Wireshark by injecting malicious packets or providing a crafted capture file that triggers an infinite loop in the BitTorrent DHT dissector.
CVE-2021-4184 has a severity rating of high, with a CVSS score of 7.5.
Wireshark versions 3.6.0 and 3.4.0 to 3.4.10 are affected by CVE-2021-4184.
To fix the CVE-2021-4184 vulnerability, it is recommended to update to a patched version of Wireshark (3.4.11 or later for 3.4.x branch, or 3.6.1 or later for 3.6.x branch).