{"id":"CVE-2024-2955","summary":"Mismatched Memory Management Routines in Wireshark","details":"T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file","modified":"2026-03-28T03:03:16.759268Z","published":"2024-03-26T20:02:08.419Z","related":["MGASA-2024-0149","SUSE-SU-2024:3165-1","openSUSE-SU-2024:13809-1"],"database_specific":{"cna_assigner":"GitLab","cwe_ids":["CWE-762"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/2xxx/CVE-2024-2955.json"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7TWJQKXOV4HYI5C4TWRKTN7B5YL7GTU/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZD2MNS6EW2K2SSMN4YBGPZCC47KBDNEE/"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2024-06.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/2xxx/CVE-2024-2955.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2955"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/19695"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"fixed":"c1fcda4ca0fbe25deb896243c5ec8dfaeedd3092"},{"introduced":"54eedfc63953c8180b5a9c60015917cce7a2548a"},{"fixed":"1fe5bce8d665c0d64e1af63545421c67596db165"}],"database_specific":{"versions":[{"introduced":"4.0.0"},{"fixed":"4.0.14"},{"introduced":"4.2.0"},{"fixed":"4.2.4"}]}}],"versions":["v4.0.0","v4.0.1","v4.0.10","v4.0.10rc0","v4.0.11","v4.0.11rc0","v4.0.12","v4.0.12rc0","v4.0.13","v4.0.13rc0","v4.0.14rc0","v4.0.1rc0","v4.0.2","v4.0.2rc0","v4.0.3","v4.0.3rc0","v4.0.4","v4.0.4rc0","v4.0.5","v4.0.5rc0","v4.0.6","v4.0.6rc0","v4.0.7","v4.0.7rc0","v4.0.8","v4.0.8rc0","v4.0.9","v4.0.9rc0","v4.2.0","v4.2.1","v4.2.1rc0","v4.2.2","v4.2.2rc0","v4.2.3","v4.2.3rc0","v4.2.4rc0","wireshark-4.0.0","wireshark-4.0.1","wireshark-4.0.10","wireshark-4.0.11","wireshark-4.0.12","wireshark-4.0.13","wireshark-4.0.2","wireshark-4.0.3","wireshark-4.0.4","wireshark-4.0.5","wireshark-4.0.6","wireshark-4.0.7","wireshark-4.0.8","wireshark-4.0.9","wireshark-4.2.0","wireshark-4.2.1","wireshark-4.2.2","wireshark-4.2.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-2955.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"54eedfc63953c8180b5a9c60015917cce7a2548a"},{"fixed":"1fe5bce8d665c0d64e1af63545421c67596db165"}],"database_specific":{"versions":[{"introduced":"4.2.0"},{"fixed":"4.2.4"}]}},{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"fixed":"c1fcda4ca0fbe25deb896243c5ec8dfaeedd3092"}],"database_specific":{"versions":[{"introduced":"4.0.0"},{"fixed":"4.0.14"}]}}],"versions":["v4.0.0","v4.0.1","v4.0.10","v4.0.10rc0","v4.0.11","v4.0.11rc0","v4.0.12","v4.0.12rc0","v4.0.13","v4.0.13rc0","v4.0.14rc0","v4.0.1rc0","v4.0.2","v4.0.2rc0","v4.0.3","v4.0.3rc0","v4.0.4","v4.0.4rc0","v4.0.5","v4.0.5rc0","v4.0.6","v4.0.6rc0","v4.0.7","v4.0.7rc0","v4.0.8","v4.0.8rc0","v4.0.9","v4.0.9rc0","v4.2.0","v4.2.1","v4.2.1rc0","v4.2.2","v4.2.2rc0","v4.2.3","v4.2.3rc0","v4.2.4rc0","wireshark-4.0.0","wireshark-4.0.1","wireshark-4.0.10","wireshark-4.0.11","wireshark-4.0.12","wireshark-4.0.13","wireshark-4.0.2","wireshark-4.0.3","wireshark-4.0.4","wireshark-4.0.5","wireshark-4.0.6","wireshark-4.0.7","wireshark-4.0.8","wireshark-4.0.9","wireshark-4.2.0","wireshark-4.2.1","wireshark-4.2.2","wireshark-4.2.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-2955.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}