Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2024-4853
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-4853
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-4853.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-4853
Downstream
DEBIAN-CVE-2024-4853
DLA-3906-1
OESA-2024-1654
OESA-2024-1727
SUSE-SU-2024:1865-1
SUSE-SU-2024:2265-1
UBUNTU-CVE-2024-4853
openSUSE-SU-2024:13978-1
Related
MGASA-2024-0206
SUSE-SU-2024:1865-1
SUSE-SU-2024:2265-1
openSUSE-SU-2024:13978-1
Published
2024-05-14T15:45:18Z
Modified
2025-09-19T15:11:14.735679Z
Severity
5.5 (Medium)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS Calculator
Summary
[none]
Details
Memory handling issue in editcap could cause denial of service via crafted capture file
References
https://www.wireshark.org/security/wnpa-sec-2024-08.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2BSENPSIALF2WIZF7M3QBVWYBMFGW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MKFJAZDKXGFFQPRDYLX2AANRNMYZZEZ/
https://gitlab.com/wireshark/wireshark/-/issues/19724
Affected packages
Git
/
github.com/wireshark/wireshark
Affected ranges
Type
GIT
Repo
https://github.com/wireshark/wireshark
Events
Introduced
3a34e44d02c9c91f9f851bd6f29ff4505131b127
Fixed
8b52657fa4eeda249e007bf0441f26d9ead63e47
Type
GIT
Repo
https://gitlab.com/wireshark/wireshark
Events
Introduced
0cbe09cd796b2ea24c6069b76ea16df7f51cf67b
Fixed
10bc5ded73f3403769d4a6e1a2438a776373aa8a
Affected versions
v3.*
v3.6.0
v3.6.1
v3.6.10
v3.6.10rc0
v3.6.11
v3.6.11rc0
v3.6.12
v3.6.12rc0
v3.6.13
v3.6.13rc0
v3.6.14
v3.6.14rc0
v3.6.15
v3.6.15rc0
v3.6.16
v3.6.16rc0
v3.6.17
v3.6.17rc0
v3.6.18
v3.6.18rc0
v3.6.19
v3.6.19rc0
v3.6.1rc0
v3.6.2
v3.6.20
v3.6.20rc0
v3.6.21
v3.6.21rc0
v3.6.22
v3.6.22rc0
v3.6.23rc0
v3.6.2rc0
v3.6.3
v3.6.3rc0
v3.6.4
v3.6.4rc0
v3.6.5
v3.6.5rc0
v3.6.6
v3.6.6rc0
v3.6.7
v3.6.7rc0
v3.6.8
v3.6.8rc0
v3.6.9
v3.6.9rc0
v4.*
v4.0.0
v4.0.1
v4.0.10
v4.0.10rc0
v4.0.11
v4.0.11rc0
v4.0.12
v4.0.12rc0
v4.0.13
v4.0.13rc0
v4.0.14
v4.0.14rc0
v4.0.15rc0
v4.0.1rc0
v4.0.2
v4.0.2rc0
v4.0.3
v4.0.3rc0
v4.0.4
v4.0.4rc0
v4.0.5
v4.0.5rc0
v4.0.6
v4.0.6rc0
v4.0.7
v4.0.7rc0
v4.0.8
v4.0.8rc0
v4.0.9
v4.0.9rc0
wireshark-3.*
wireshark-3.6.0
wireshark-3.6.1
wireshark-3.6.10
wireshark-3.6.11
wireshark-3.6.12
wireshark-3.6.13
wireshark-3.6.14
wireshark-3.6.15
wireshark-3.6.16
wireshark-3.6.17
wireshark-3.6.18
wireshark-3.6.19
wireshark-3.6.2
wireshark-3.6.20
wireshark-3.6.21
wireshark-3.6.22
wireshark-3.6.3
wireshark-3.6.4
wireshark-3.6.5
wireshark-3.6.6
wireshark-3.6.7
wireshark-3.6.8
wireshark-3.6.9
wireshark-4.*
wireshark-4.0.0
wireshark-4.0.1
wireshark-4.0.10
wireshark-4.0.11
wireshark-4.0.12
wireshark-4.0.13
wireshark-4.0.14
wireshark-4.0.2
wireshark-4.0.3
wireshark-4.0.4
wireshark-4.0.5
wireshark-4.0.6
wireshark-4.0.7
wireshark-4.0.8
wireshark-4.0.9
CVE-2024-4853 - OSV