Impact
This vulnerability is an infinite loop triggered in the UDS protocol dissector, leading to a denial of service. The flaw is classified as CWE-835. When a crafted packet exercises this loop, Wireshark becomes unresponsive, disrupting its availability. The issue does not provide a path to privilege escalation or data leakage.
Affected Systems
Wireshark Foundation’s Wireshark software in versions 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 is affected. Any installation within these ranges is vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity; the EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers likely need the Wireshark process to parse a UDS packet, which could occur via a locally crafted pcap file or during a live capture of traffic that contains the packet. No public exploits are known, but the ability to supply such traffic would cause the application to hang and could be used to disrupt analysis workflows.
OpenCVE Enrichment