First published: Wed Feb 21 2024(Updated: )
A Buffer Overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the wsutil/to_str.c, and format_fractional_part_nsecs components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark | <4.2.0 | |
Wireshark | <4.2.0 | |
Red Hat Fedora | =40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24479 is considered to lead to a denial of service due to a buffer overflow.
To mitigate CVE-2024-24479, ensure you upgrade to Wireshark version 4.2.0 or later, although the vendor disputes any impact.
CVE-2024-24479 affects versions of Wireshark prior to 4.2.0.
Yes, CVE-2024-24479 can be exploited by a remote attacker.
CVE-2024-24479 involves the wsutil/to_str.c and format_fractional_part_nsecs components.