Description
Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Published: 2026-04-30
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A heap‑based buffer overflow in Wireshark’s sharkd component can cause the application to crash, resulting in denial of service for anyone attempting to analyze traffic. The flaw is classified as CWE‑122 and can lead to a null pointer dereference (CWE‑476) when the overflow corrupts a pointer. It does not expose confidentiality or integrity risks, but it can interrupt network analysis workflows and could allow a repeated exploitation if the application is left unattended.

Affected Systems

The vulnerability affects the Wireshark Foundation Wireshark product, specifically versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. Users running any of these releases should be aware that the flaw is present.

Risk and Exploitability

The CVSS score of 5.5 indicates a medium severity for the potential to disrupt operations. EPSS data is not available, and the issue is not listed in the CISA KEV catalog, but the attack vector is likely through malformed network traffic or crafted packet captures fed to Wireshark. An attacker could trigger the crash by delivering malicious packets to a system running a vulnerable version of Wireshark.

Generated by OpenCVE AI on April 30, 2026 at 13:53 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.5 or above


OpenCVE Recommended Actions

  • Upgrade Wireshark to version 4.6.5 or later to eliminate the buffer overflow
  • If an upgrade is delayed, disable or isolate the sharkd daemon to prevent unintended processing of untrusted traffic
  • Implement network filtering to restrict exposure of vulnerable systems to untrusted packet streams

Generated by OpenCVE AI on April 30, 2026 at 13:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 30 Apr 2026 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 05:30:00 +0000

Type Values Removed Values Added
Description Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Heap-based Buffer Overflow in Wireshark
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-30T15:21:01.242Z

Reserved: 2026-04-29T07:34:16.106Z

Link: CVE-2026-7378

cve-icon Vulnrichment

Updated: 2026-04-30T14:48:07.693Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-30T06:16:17.183

Modified: 2026-04-30T15:13:14.230

Link: CVE-2026-7378

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-30T05:04:25Z

Links: CVE-2026-7378 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:00:22Z

Weaknesses