Impact
A heap‑based buffer overflow in Wireshark’s sharkd component can cause the application to crash, resulting in denial of service for anyone attempting to analyze traffic. The flaw is classified as CWE‑122 and can lead to a null pointer dereference (CWE‑476) when the overflow corrupts a pointer. It does not expose confidentiality or integrity risks, but it can interrupt network analysis workflows and could allow a repeated exploitation if the application is left unattended.
Affected Systems
The vulnerability affects the Wireshark Foundation Wireshark product, specifically versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. Users running any of these releases should be aware that the flaw is present.
Risk and Exploitability
The CVSS score of 5.5 indicates a medium severity for the potential to disrupt operations. EPSS data is not available, and the issue is not listed in the CISA KEV catalog, but the attack vector is likely through malformed network traffic or crafted packet captures fed to Wireshark. An attacker could trigger the crash by delivering malicious packets to a system running a vulnerable version of Wireshark.
OpenCVE Enrichment