First published: Wed Feb 21 2024(Updated: )
A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark | <4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24476 is classified as a buffer overflow vulnerability that can lead to a denial of service.
To mitigate CVE-2024-24476, upgrade Wireshark to version 4.2.0 or later.
CVE-2024-24476 affects versions of Wireshark prior to 4.2.0.
Yes, CVE-2024-24476 can be exploited by remote attackers to cause a denial of service.
The vendor disputes the impact of CVE-2024-24476, claiming that neither version 4.2.0 nor any other release was affected.