A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 14 Apr 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fedoraproject
Fedoraproject fedora Wireshark Wireshark wireshark |
|
| CPEs | cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fedoraproject
Fedoraproject fedora Wireshark Wireshark wireshark |
Thu, 22 Aug 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-119 |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-04T18:29:04.239Z
Reserved: 2024-01-25T00:00:00.000Z
Link: CVE-2024-24476
Updated: 2024-08-01T23:19:52.599Z
Status : Modified
Published: 2024-02-21T19:15:09.030
Modified: 2025-11-04T19:16:57.047
Link: CVE-2024-24476
OpenCVE Enrichment
No data.