CVE-2024-0208

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-0208
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-0208.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-0208
Related
Published
2024-01-03T08:15:10Z
Modified
2024-11-09T12:55:17.699928Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

GVCP dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file

References

Affected packages

Debian:11 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.16-0+deb11u1

Affected versions

3.*

3.4.4-1
3.4.6-1~exp1
3.4.7-1~exp1
3.4.7-1
3.4.8-1
3.4.9-1
3.4.10-0+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.17-0+deb12u1

Affected versions

4.*

4.0.3-1
4.0.5-1~exp1
4.0.6-1~deb12u1
4.0.6-1~exp1
4.0.6-1
4.0.7-1
4.0.8-1
4.0.10-1
4.0.11-1~deb12u1
4.0.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.2-1

Affected versions

4.*

4.0.3-1
4.0.5-1~exp1
4.0.6-1~deb12u1
4.0.6-1~exp1
4.0.6-1
4.0.7-1
4.0.8-1
4.0.10-1
4.0.11-1~deb12u1
4.0.11-1
4.2.0~rc3-1~exp1
4.2.0-1~exp0
4.2.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/wireshark/wireshark

Affected ranges

Affected versions

v3.*

v3.6.0
v3.6.1
v3.6.10
v3.6.10rc0
v3.6.11
v3.6.11rc0
v3.6.12
v3.6.12rc0
v3.6.13
v3.6.13rc0
v3.6.14
v3.6.14rc0
v3.6.15
v3.6.15rc0
v3.6.16
v3.6.16rc0
v3.6.17
v3.6.17rc0
v3.6.18
v3.6.18rc0
v3.6.19
v3.6.19rc0
v3.6.1rc0
v3.6.2
v3.6.2rc0
v3.6.3
v3.6.3rc0
v3.6.4
v3.6.4rc0
v3.6.5
v3.6.5rc0
v3.6.6
v3.6.6rc0
v3.6.7
v3.6.7rc0
v3.6.8
v3.6.8rc0
v3.6.9
v3.6.9rc0

v4.*

v4.0.0
v4.0.1
v4.0.10
v4.0.10rc0
v4.0.11
v4.0.11rc0
v4.0.1rc0
v4.0.2
v4.0.2rc0
v4.0.3
v4.0.3rc0
v4.0.4
v4.0.4rc0
v4.0.5
v4.0.5rc0
v4.0.6
v4.0.6rc0
v4.0.7
v4.0.7rc0
v4.0.8
v4.0.8rc0
v4.0.9
v4.0.9rc0

wireshark-3.*

wireshark-3.6.0
wireshark-3.6.1
wireshark-3.6.10
wireshark-3.6.11
wireshark-3.6.12
wireshark-3.6.13
wireshark-3.6.14
wireshark-3.6.15
wireshark-3.6.16
wireshark-3.6.17
wireshark-3.6.18
wireshark-3.6.19
wireshark-3.6.2
wireshark-3.6.3
wireshark-3.6.4
wireshark-3.6.5
wireshark-3.6.6
wireshark-3.6.7
wireshark-3.6.8
wireshark-3.6.9

wireshark-4.*

wireshark-4.0.0
wireshark-4.0.1
wireshark-4.0.10
wireshark-4.0.11
wireshark-4.0.2
wireshark-4.0.3
wireshark-4.0.4
wireshark-4.0.5
wireshark-4.0.6
wireshark-4.0.7
wireshark-4.0.8
wireshark-4.0.9