Impact
The vulnerability resides in the RDP protocol dissector of Wireshark. A heap-based buffer overflow occurs when the application parses certain malformed RDP packets, which can crash the application and potentially allow an attacker to execute arbitrary code. The flaw is classified as CWE-122 (Heap-Based Buffer Overflow) and also represents a CWE-787 (Out-of-Bounds Write) condition.
Affected Systems
Wireshark Foundation's Wireshark product is affected, specifically versions 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14.
Risk and Exploitability
The CVSS score of 7.8 indicates a high risk level. The EPSS score is less than 1%, indicating a very low exploitation probability. The vulnerability is not listed in CISA's KEV catalog. Based on the description, the likely attack vector involves supplying crafted RDP packets while Wireshark parses a capture file; this can lead to a crash or, in some conditions, code execution, impacting the integrity and availability of systems running Wireshark.
OpenCVE Enrichment