Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file
Solution:
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.wireshark.org/security/wnpa-sec-2025-02.html | |
https://gitlab.com/wireshark/wireshark/-/issues/20509 | issue tracking permissions required |