A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 14 Apr 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fedoraproject
Fedoraproject fedora Wireshark Wireshark wireshark |
|
| CPEs | cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fedoraproject
Fedoraproject fedora Wireshark Wireshark wireshark |
Thu, 22 Aug 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-119 |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-04T18:29:04.239Z
Reserved: 2024-01-25T00:00:00.000Z
Link: CVE-2024-24476
Updated: 2024-08-01T23:19:52.599Z
Status : Modified
Published: 2024-02-21T19:15:09.030
Modified: 2025-11-04T19:16:57.047
Link: CVE-2024-24476
OpenCVE Enrichment
No data.