Bug 1220179 (CVE-2024-24479) - VUL-0: CVE-2024-24479: wireshark: Buffer Overflow via wsutil/to_str.c and format_fractional_part_nsecs results in Denial of Service
Summary: VUL-0: CVE-2024-24479: wireshark: Buffer Overflow via wsutil/to_str.c and for...
Status: RESOLVED INVALID
Alias: CVE-2024-24479
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Robert Frohl
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/394781/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-24479:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-02-22 08:23 UTC by SMASH SMASH
Modified: 2024-03-22 14:39 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-02-22 08:23:52 UTC
Buffer Overflow vulnerability in Wireshark team Wireshark before v.4.2.0 allows a remote attacker to cause a denial of service via the wsutil/to_str.c, and format_fractional_part_nsecs components.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24479
https://www.cve.org/CVERecord?id=CVE-2024-24479
https://gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78
https://github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd
https://bugzilla.redhat.com/show_bug.cgi?id=2265433
Comment 2 Robert Frohl 2024-03-22 14:37:10 UTC
format_fractional_part_nsecs() was introduced during the development phase of 4.2, i.e. with 4.1.1. Therefor never went into an earlier released version, meaning 4.0 or earlier.
Comment 3 Robert Frohl 2024-03-22 14:38:31 UTC
fix is part of 4.2.0 (commit c3720cff158c265dec2a0c6104b1d65954ae6bfd)
Comment 4 Robert Frohl 2024-03-22 14:39:24 UTC
closing, normal users never saw this CVE