{"id":"CVE-2024-11596","summary":"Buffer Over-read in Wireshark","details":"ECMP dissector crash in Wireshark 4.4.0 to 4.4.1 and 4.2.0 to 4.2.8 allows denial of service via packet injection or crafted capture file","modified":"2026-04-10T04:12:44.976188Z","published":"2024-11-21T09:30:59.843Z","related":["SUSE-SU-2024:4142-1","SUSE-SU-2026:1169-1","openSUSE-SU-2024:14529-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/11xxx/CVE-2024-11596.json","cwe_ids":["CWE-126"],"cna_assigner":"GitLab"},"references":[{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2024-15.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/11xxx/CVE-2024-11596.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-11596"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/20214"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"54eedfc63953c8180b5a9c60015917cce7a2548a"},{"fixed":"2acaabc9099cb3d7e5715776e00068ccfd07ac58"},{"introduced":"009a163470b581c7d3ee66d89c819cef1f9e50fe"},{"fixed":"9947b17309f435fe6d3dfe5595f43995cb42709e"}],"database_specific":{"versions":[{"introduced":"4.2.0"},{"fixed":"4.2.9"},{"introduced":"4.4.0"},{"fixed":"4.4.2"}]}}],"versions":["v4.2.0","v4.2.1","v4.2.1rc0","v4.2.2","v4.2.2rc0","v4.2.3","v4.2.3rc0","v4.2.4","v4.2.4rc0","v4.2.5","v4.2.5rc0","v4.2.6","v4.2.6rc0","v4.2.7","v4.2.7rc0","v4.2.8","v4.2.8rc0","v4.2.9rc0","v4.4.0","v4.4.1","v4.4.1rc0","v4.4.2rc0","wireshark-4.2.0","wireshark-4.2.1","wireshark-4.2.2","wireshark-4.2.3","wireshark-4.2.4","wireshark-4.2.5","wireshark-4.2.6","wireshark-4.2.7","wireshark-4.2.8","wireshark-4.4.0","wireshark-4.4.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-11596.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"009a163470b581c7d3ee66d89c819cef1f9e50fe"},{"fixed":"9947b17309f435fe6d3dfe5595f43995cb42709e"},{"introduced":"54eedfc63953c8180b5a9c60015917cce7a2548a"},{"fixed":"2acaabc9099cb3d7e5715776e00068ccfd07ac58"}],"database_specific":{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"4.4.0"},{"fixed":"4.4.2"},{"introduced":"4.2.0"},{"fixed":"4.2.9"}]}}],"versions":["v4.2.0","v4.2.1","v4.2.1rc0","v4.2.2","v4.2.2rc0","v4.2.3","v4.2.3rc0","v4.2.4","v4.2.4rc0","v4.2.5","v4.2.5rc0","v4.2.6","v4.2.6rc0","v4.2.7","v4.2.7rc0","v4.2.8","v4.2.8rc0","v4.2.9rc0","v4.4.0","v4.4.1","v4.4.1rc0","v4.4.2rc0","wireshark-4.2.0","wireshark-4.2.1","wireshark-4.2.2","wireshark-4.2.3","wireshark-4.2.4","wireshark-4.2.5","wireshark-4.2.6","wireshark-4.2.7","wireshark-4.2.8","wireshark-4.4.0","wireshark-4.4.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-11596.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}