Impact
A heap‑based buffer overflow occurs when Wireshark processes an SBC (Single Byte Code) codec packet in versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. The overflow can trigger a crash, creating a denial‑of‑service condition, and potentially allow an attacker to execute arbitrary code depending on the environment. The weakness is classified as CWE-122 and CWE-787.
Affected Systems
The vulnerability affects Wireshark software distributed by the Wireshark Foundation. Systems running any of the affected releases—Wireshark 4.6.0‑4.6.4 or 4.4.0‑4.4.14—are at risk. Upgrading to 4.6.5 or later removes the flaw.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity. The EPSS score of 0.00014 indicates an exceptionally low probability of exploitation, though the likelihood cannot be dismissed entirely. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread exploitation. The attack can be carried out by feeding crafted network traffic that includes a malicious SBC codec packet, so the likely vector is network or locally imported capture files. Organizations should treat the risk as significant until the update is applied.
OpenCVE Enrichment