{"id":"CVE-2022-3725","details":"Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file","modified":"2026-03-20T12:12:59.682338Z","published":"2022-10-27T00:00:00Z","related":["SUSE-SU-2022:4453-1","openSUSE-SU-2024:14223-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3725.json","cna_assigner":"GitLab"},"references":[{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3725.json"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2022-07.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3725.json"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIEIFFZ27YKCTK5C2VT4OEQSHPQDBNSF/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3725"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-02"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/18378"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"last_affected":"d25900c51508135ac54abfa66a7a07176cdee041"}],"database_specific":{"versions":[{"introduced":"3.6.0"},{"last_affected":"3.6.8"}]}}],"versions":["v3.6.0","v3.6.1","v3.6.1rc0","v3.6.2","v3.6.2rc0","v3.6.3","v3.6.3rc0","v3.6.4","v3.6.4rc0","v3.6.5","v3.6.5rc0","v3.6.6","v3.6.6rc0","v3.6.7","v3.6.7rc0","v3.6.8","v3.6.8rc0","wireshark-3.6.0","wireshark-3.6.1","wireshark-3.6.2","wireshark-3.6.3","wireshark-3.6.4","wireshark-3.6.5","wireshark-3.6.6","wireshark-3.6.7","wireshark-3.6.8"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-3725.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"fixed":"d25900c51508135ac54abfa66a7a07176cdee041"}],"database_specific":{"versions":[{"introduced":"3.6.0"},{"fixed":"3.6.8"}]}}],"versions":["v3.6.0","v3.6.1","v3.6.1rc0","v3.6.2","v3.6.2rc0","v3.6.3","v3.6.3rc0","v3.6.4","v3.6.4rc0","v3.6.5","v3.6.5rc0","v3.6.6","v3.6.6rc0","v3.6.7","v3.6.7rc0","v3.6.8rc0","wireshark-3.6.0","wireshark-3.6.1","wireshark-3.6.2","wireshark-3.6.3","wireshark-3.6.4","wireshark-3.6.5","wireshark-3.6.6","wireshark-3.6.7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-3725.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}