Impact
The vulnerability is an uncontrolled recursion in the Monero protocol dissector within Wireshark versions 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14. When a crafted packet that exercises this recursion is parsed, the dissector repeatedly calls itself until the stack overflows, causing Wireshark to crash. The crash results in a denial of service, preventing the user from continuing to analyze network traffic or capturing packets. This weakness is identified as CWE-674, an uncontrolled recursion flaw.
Affected Systems
Affected products are Wireshark by the Wireshark Foundation. Versions vulnerable include Wireshark 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. All installations of these versions running the Monero protocol dissector are susceptible.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity. There is no EPSS score available, and the vulnerability is not listed in CISA's KEV catalog. Since the error occurs during dissector parsing of network data, the exploit likely requires the ability to supply crafted traffic to the running Wireshark instance, suggesting a local or remote privilege to inject traffic into the capture source. No missing authorisation checks are mentioned, so exploitation is limited to causing a crash; confidentiality and integrity are not directly affected. The exploit path is the receipt of malicious Monero traffic by Wireshark, which triggers the recursion and stack overflow.
OpenCVE Enrichment