Impact
The vulnerability is a classic buffer overflow in the K12 RF5 file parser of Wireshark versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. A specially crafted K12 RF5 packet capture triggers a buffer copy without size checks, causing Wireshark to crash. This results in a denial of service to the end user, halting network analysis and disrupting workflows. The weakness is identified as CWE‑120.
Affected Systems
Affected vendors are Wireshark Foundation, product Wireshark. Releases 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 are susceptible; later versions are not affected.
Risk and Exploitability
The CVSS score of 4.7 indicates a moderate impact with limited exploitation complexity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker could deliver a crafted K12 RF5 file to Wireshark, either by having a user open a malicious capture or by sending the file to a target system for local analysis. This would lead to an immediate crash and denial of service. The vulnerability can be exploited without authentication and is likely local to the machine running the software.
OpenCVE Enrichment