
Cloud Vulnerability DB
A community-led vulnerabilities database
A Buffer Overflow vulnerability was reported in Wireshark before version 4.2.0, identified as CVE-2024-24479. The vulnerability was initially reported to affect the wsutil/to_str.c and format_fractional_part_nsecs components. However, this vulnerability is disputed by the vendor, who states that neither release 4.2.0 nor any other release was affected (CVE Mitre).
The vulnerability was initially reported as a buffer overflow condition in the format_fractional_part_nsecs components of Wireshark. The issue was related to the handling of buffer operations in the wsutil/to_str.c file. A commit was made to address various enhancements and fixes to format_fractional_part_nsecs(), including improvements to buffer handling and size checking (Wireshark Commit).
Initially, it was reported that successful exploitation of this vulnerability could allow a remote attacker to cause a denial of service condition (NVD). However, given the vendor's dispute of the vulnerability, the actual impact appears to be negligible.
While initially reported as requiring an upgrade to version 4.2.0 or later, the vendor's dispute indicates that no specific mitigation is necessary as the vulnerability did not affect any released versions (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."