
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-4185 affects the RTMPT dissector in Wireshark versions 3.6.0 and 3.4.0 to 3.4.10. This security flaw was discovered and disclosed on December 29, 2021, allowing attackers to cause a denial of service through an infinite loop condition via packet injection or crafted capture file (Wireshark Advisory, CVE Mitre).
The vulnerability exists in the RTMPT (Real Time Messaging Protocol Tunneled) dissector component of Wireshark. When processing certain malformed packets or capture files, the dissector can enter an infinite loop state, causing excessive CPU resource consumption (Wireshark Advisory).
The primary impact of this vulnerability is denial of service through excessive CPU resource consumption. When exploited, it can cause Wireshark to become unresponsive while processing malformed RTMPT packets or analyzing crafted capture files (Wireshark Advisory).
The vulnerability was fixed in Wireshark versions 3.6.1 and 3.4.11. Users are strongly recommended to upgrade to these or later versions to mitigate the risk. Various distributions have also released security updates, including Debian (DLA-2967-1), Fedora (versions 3.6.1-1.fc34 and 3.6.1-1.fc35), and Oracle in their April 2022 Critical Patch Update (Debian Advisory, Fedora Update, Oracle Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."