First published: Tue May 14 2024(Updated: )
MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark | >=4.2.0<=4.2.4>=4.0.0<=4.0.14>=3.6.0<=3.6.22 |
Upgrade to versions 4.2.5 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4854 has a high severity rating, as it allows denial of service through packet injection or crafted capture files.
To fix CVE-2024-4854, upgrade Wireshark to version 4.2.5 or later, 4.0.15 or later, or 3.6.23 or later.
CVE-2024-4854 affects Wireshark versions 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22.
Yes, CVE-2024-4854 can be exploited remotely via packet injection or by sending specially crafted capture files.
The primary consequence of CVE-2024-4854 is the potential for a denial of service attack that disrupts application availability.