CVE-2020-26420

Source
https://cve.org/CVERecord?id=CVE-2020-26420
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-26420.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-26420
Downstream
Related
Published
2020-12-11T19:15:12.293Z
Modified
2026-02-24T11:35:16.097258Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

References

Affected packages

Git / github.com/python-pillow/pillow

Affected ranges

Type
GIT
Repo
https://github.com/python-pillow/pillow
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*
1.0
1.2
1.7.6
1.7.7
1.7.8
2.*
2.0.0
2.1.0
2.2.0
2.2.1
2.2.2
2.3.0
2.5.0
2.6.0
2.6.0-rc1
2.7.0
2.8.0
2.8.1
2.9.0
2.9.0.dev0
2.9.0.dev1
2.9.0.dev2
3.*
3.0.0
3.1.0
3.1.0-rc1
3.2.0
3.3.0
3.3.1
3.4.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-26420.json"

Git / github.com/wireshark/wireshark

Affected ranges

Type
GIT
Repo
https://github.com/wireshark/wireshark
Events

Affected versions

v3.*
v3.2.0
v3.2.1
v3.2.10
v3.2.10rc0
v3.2.11
v3.2.11rc0
v3.2.12
v3.2.12rc0
v3.2.13
v3.2.13rc0
v3.2.14
v3.2.14rc0
v3.2.15
v3.2.15rc0
v3.2.16
v3.2.16rc0
v3.2.17
v3.2.17rc0
v3.2.18
v3.2.18rc0
v3.2.1rc0
v3.2.2
v3.2.2rc0
v3.2.3
v3.2.3rc0
v3.2.4
v3.2.4rc0
v3.2.5
v3.2.5rc0
v3.2.6
v3.2.6rc0
v3.2.7
v3.2.7rc0
v3.2.8
v3.2.8rc0
v3.2.9
v3.2.9rc0
wireshark-3.*
wireshark-3.2.0
wireshark-3.2.1
wireshark-3.2.10
wireshark-3.2.11
wireshark-3.2.12
wireshark-3.2.13
wireshark-3.2.14
wireshark-3.2.15
wireshark-3.2.16
wireshark-3.2.17
wireshark-3.2.18
wireshark-3.2.2
wireshark-3.2.3
wireshark-3.2.4
wireshark-3.2.5
wireshark-3.2.6
wireshark-3.2.7
wireshark-3.2.8
wireshark-3.2.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-26420.json"