{"id":"CVE-2024-4853","summary":"Mismatched Memory Management Routines in editcap","details":"Memory handling issue in editcap could cause denial of service via crafted capture file","modified":"2026-04-16T00:06:03.577218453Z","published":"2024-05-14T00:03:07.500Z","related":["SUSE-SU-2024:1865-1","SUSE-SU-2024:2265-1","SUSE-SU-2025:1522-1","openSUSE-SU-2024:13978-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/4xxx/CVE-2024-4853.json","cna_assigner":"GitLab","cwe_ids":["CWE-762"]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2BSENPSIALF2WIZF7M3QBVWYBMFGW/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MKFJAZDKXGFFQPRDYLX2AANRNMYZZEZ/"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2024-08.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/4xxx/CVE-2024-4853.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4853"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/19724"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"fixed":"8b52657fa4eeda249e007bf0441f26d9ead63e47"},{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"fixed":"10bc5ded73f3403769d4a6e1a2438a776373aa8a"},{"introduced":"54eedfc63953c8180b5a9c60015917cce7a2548a"},{"fixed":"4aa814ac25a18ea48d4002351ed45d4b245b0c08"}],"database_specific":{"versions":[{"introduced":"3.6.0"},{"fixed":"3.6.23"},{"introduced":"4.0.0"},{"fixed":"4.0.15"},{"introduced":"4.2.0"},{"fixed":"4.2.5"}]}}],"versions":["v3.6.0","v3.6.1","v3.6.10","v3.6.10rc0","v3.6.11","v3.6.11rc0","v3.6.12","v3.6.12rc0","v3.6.13","v3.6.13rc0","v3.6.14","v3.6.14rc0","v3.6.15","v3.6.15rc0","v3.6.16","v3.6.16rc0","v3.6.17","v3.6.17rc0","v3.6.18","v3.6.18rc0","v3.6.19","v3.6.19rc0","v3.6.1rc0","v3.6.2","v3.6.20","v3.6.20rc0","v3.6.21","v3.6.21rc0","v3.6.22","v3.6.22rc0","v3.6.23rc0","v3.6.2rc0","v3.6.3","v3.6.3rc0","v3.6.4","v3.6.4rc0","v3.6.5","v3.6.5rc0","v3.6.6","v3.6.6rc0","v3.6.7","v3.6.7rc0","v3.6.8","v3.6.8rc0","v3.6.9","v3.6.9rc0","v4.0.0","v4.0.1","v4.0.10","v4.0.10rc0","v4.0.11","v4.0.11rc0","v4.0.12","v4.0.12rc0","v4.0.13","v4.0.13rc0","v4.0.14","v4.0.14rc0","v4.0.15rc0","v4.0.1rc0","v4.0.2","v4.0.2rc0","v4.0.3","v4.0.3rc0","v4.0.4","v4.0.4rc0","v4.0.5","v4.0.5rc0","v4.0.6","v4.0.6rc0","v4.0.7","v4.0.7rc0","v4.0.8","v4.0.8rc0","v4.0.9","v4.0.9rc0","v4.2.0","v4.2.1","v4.2.1rc0","v4.2.2","v4.2.2rc0","v4.2.3","v4.2.3rc0","v4.2.4","v4.2.4rc0","v4.2.5rc0","wireshark-3.6.0","wireshark-3.6.1","wireshark-3.6.10","wireshark-3.6.11","wireshark-3.6.12","wireshark-3.6.13","wireshark-3.6.14","wireshark-3.6.15","wireshark-3.6.16","wireshark-3.6.17","wireshark-3.6.18","wireshark-3.6.19","wireshark-3.6.2","wireshark-3.6.20","wireshark-3.6.21","wireshark-3.6.22","wireshark-3.6.3","wireshark-3.6.4","wireshark-3.6.5","wireshark-3.6.6","wireshark-3.6.7","wireshark-3.6.8","wireshark-3.6.9","wireshark-4.0.0","wireshark-4.0.1","wireshark-4.0.10","wireshark-4.0.11","wireshark-4.0.12","wireshark-4.0.13","wireshark-4.0.14","wireshark-4.0.2","wireshark-4.0.3","wireshark-4.0.4","wireshark-4.0.5","wireshark-4.0.6","wireshark-4.0.7","wireshark-4.0.8","wireshark-4.0.9","wireshark-4.2.0","wireshark-4.2.1","wireshark-4.2.2","wireshark-4.2.3","wireshark-4.2.4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-4853.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"54eedfc63953c8180b5a9c60015917cce7a2548a"},{"fixed":"4aa814ac25a18ea48d4002351ed45d4b245b0c08"},{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"fixed":"10bc5ded73f3403769d4a6e1a2438a776373aa8a"},{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"fixed":"8b52657fa4eeda249e007bf0441f26d9ead63e47"}],"database_specific":{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"4.2.0"},{"fixed":"4.2.5"},{"introduced":"4.0.0"},{"fixed":"4.0.15"},{"introduced":"3.6.0"},{"fixed":"3.6.23"}]}}],"versions":["v3.6.0","v3.6.1","v3.6.10","v3.6.10rc0","v3.6.11","v3.6.11rc0","v3.6.12","v3.6.12rc0","v3.6.13","v3.6.13rc0","v3.6.14","v3.6.14rc0","v3.6.15","v3.6.15rc0","v3.6.16","v3.6.16rc0","v3.6.17","v3.6.17rc0","v3.6.18","v3.6.18rc0","v3.6.19","v3.6.19rc0","v3.6.1rc0","v3.6.2","v3.6.20","v3.6.20rc0","v3.6.21","v3.6.21rc0","v3.6.22","v3.6.22rc0","v3.6.23rc0","v3.6.2rc0","v3.6.3","v3.6.3rc0","v3.6.4","v3.6.4rc0","v3.6.5","v3.6.5rc0","v3.6.6","v3.6.6rc0","v3.6.7","v3.6.7rc0","v3.6.8","v3.6.8rc0","v3.6.9","v3.6.9rc0","v4.0.0","v4.0.1","v4.0.10","v4.0.10rc0","v4.0.11","v4.0.11rc0","v4.0.12","v4.0.12rc0","v4.0.13","v4.0.13rc0","v4.0.14","v4.0.14rc0","v4.0.15rc0","v4.0.1rc0","v4.0.2","v4.0.2rc0","v4.0.3","v4.0.3rc0","v4.0.4","v4.0.4rc0","v4.0.5","v4.0.5rc0","v4.0.6","v4.0.6rc0","v4.0.7","v4.0.7rc0","v4.0.8","v4.0.8rc0","v4.0.9","v4.0.9rc0","v4.2.0","v4.2.1","v4.2.1rc0","v4.2.2","v4.2.2rc0","v4.2.3","v4.2.3rc0","v4.2.4","v4.2.4rc0","v4.2.5rc0","wireshark-3.6.0","wireshark-3.6.1","wireshark-3.6.10","wireshark-3.6.11","wireshark-3.6.12","wireshark-3.6.13","wireshark-3.6.14","wireshark-3.6.15","wireshark-3.6.16","wireshark-3.6.17","wireshark-3.6.18","wireshark-3.6.19","wireshark-3.6.2","wireshark-3.6.20","wireshark-3.6.21","wireshark-3.6.22","wireshark-3.6.3","wireshark-3.6.4","wireshark-3.6.5","wireshark-3.6.6","wireshark-3.6.7","wireshark-3.6.8","wireshark-3.6.9","wireshark-4.0.0","wireshark-4.0.1","wireshark-4.0.10","wireshark-4.0.11","wireshark-4.0.12","wireshark-4.0.13","wireshark-4.0.14","wireshark-4.0.2","wireshark-4.0.3","wireshark-4.0.4","wireshark-4.0.5","wireshark-4.0.6","wireshark-4.0.7","wireshark-4.0.8","wireshark-4.0.9","wireshark-4.2.0","wireshark-4.2.1","wireshark-4.2.2","wireshark-4.2.3","wireshark-4.2.4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-4853.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"}]}