{"id":"CVE-2021-4184","details":"Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file","modified":"2026-04-09T08:16:47.764720Z","published":"2021-12-30T22:15:10.307Z","related":["MGASA-2022-0004","SUSE-SU-2022:0375-1","openSUSE-SU-2022:0375-1","openSUSE-SU-2024:11703-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q6XGBKWSQFCVYUN4ZK3O3NJIFP3OAFVT/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5AEK3XTOIOGCGUILUFISMGX54YJXWGJ/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202210-04"},{"type":"ADVISORY","url":"https://www.wireshark.org/security/wnpa-sec-2021-18.html"},{"type":"ADVISORY","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4184.json"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00041.html"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/17754"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"9733f173ea5e6255e8da208ef183210aa264d948"},{"last_affected":"733b3a137c2ba8c8e517e5fb37bcc3030a43d603"},{"introduced":"0"},{"last_affected":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"}],"database_specific":{"versions":[{"introduced":"3.4.0"},{"last_affected":"3.4.10"},{"introduced":"0"},{"last_affected":"3.6.0"}]}}],"versions":["backups/ethereal@18706","ethereal-0-3-15","ethereal-0.3.15","start","v1.11.0","v1.11.0-rc1","v1.11.1","v1.11.1-rc1","v1.11.2","v1.11.2-rc1","v1.11.3","v1.11.3-rc1","v1.11.4-rc1","v1.99.0","v1.99.0-rc1","v1.99.1","v1.99.10rc0","v1.99.1rc0","v1.99.2","v1.99.2rc0","v1.99.3","v1.99.3rc0","v1.99.4","v1.99.4rc0","v1.99.5","v1.99.5rc0","v1.99.6","v1.99.6rc0","v1.99.7","v1.99.7rc0","v1.99.8","v1.99.8rc0","v1.99.9","v1.99.9rc0","v2.1.0","v2.1.0rc0","v2.1.1","v2.1.1rc0","v2.1.2rc0","v2.3.0rc0","v2.5.0","v2.5.0rc0","v2.5.1","v2.5.1rc0","v2.5.2rc0","v2.9.0","v2.9.0rc0","v2.9.1rc0","v3.1.0","v3.1.0rc0","v3.1.1","v3.1.1rc0","v3.1.2rc0","v3.3.0","v3.3.0rc0","v3.3.1","v3.3.1rc0","v3.3.2rc0","v3.4.0","v3.4.1","v3.4.10","v3.4.10rc0","v3.4.1rc0","v3.4.2","v3.4.2rc0","v3.4.3","v3.4.3rc0","v3.4.4","v3.4.4rc0","v3.4.5","v3.4.5rc0","v3.4.6","v3.4.6rc0","v3.4.7","v3.4.7rc0","v3.4.8","v3.4.8rc0","v3.4.9","v3.4.9rc0","v3.5.0","v3.5.0rc0","v3.5.1rc0","v3.6.0","v3.6.0rc0","v3.6.0rc1","v3.6.0rc2","v3.6.0rc3","wireshark-1.11.3","wireshark-1.99.0","wireshark-1.99.1","wireshark-1.99.2","wireshark-1.99.3","wireshark-1.99.4","wireshark-1.99.5","wireshark-1.99.6","wireshark-1.99.7","wireshark-1.99.8","wireshark-1.99.9","wireshark-2.1.0","wireshark-2.1.1","wireshark-2.5.0","wireshark-3.4.0","wireshark-3.4.1","wireshark-3.4.10","wireshark-3.4.2","wireshark-3.4.3","wireshark-3.4.4","wireshark-3.4.5","wireshark-3.4.6","wireshark-3.4.7","wireshark-3.4.8","wireshark-3.4.9","wireshark-3.6.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-4184.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}