{"id":"CVE-2026-3201","summary":"Improperly Controlled Sequential Memory Allocation in Wireshark","details":"USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service","modified":"2026-04-10T04:18:18.606981Z","published":"2026-02-25T14:35:50.969Z","related":["SUSE-SU-2026:0810-1","SUSE-SU-2026:1169-1","openSUSE-SU-2026:10274-1"],"database_specific":{"cwe_ids":["CWE-1325"],"cna_assigner":"GitLab","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/3xxx/CVE-2026-3201.json"},"references":[{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2026-05.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/3xxx/CVE-2026-3201.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3201"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/20972"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"009a163470b581c7d3ee66d89c819cef1f9e50fe"},{"fixed":"2e231b8d9926750a68f69a0ed5f80af3cacfe9c3"},{"introduced":"cdfb6721e77c19d43f4787f66e9d5f2525281a22"},{"fixed":"93282876538d78a2927108dd71ee0ff370aedb0a"}],"database_specific":{"versions":[{"introduced":"4.4.0"},{"fixed":"4.4.14"},{"introduced":"4.6.0"},{"fixed":"4.6.4"}]}}],"versions":["v4.4.0","v4.4.1","v4.4.10","v4.4.10rc0","v4.4.11","v4.4.11rc0","v4.4.12","v4.4.12rc0","v4.4.13","v4.4.13rc0","v4.4.14rc0","v4.4.1rc0","v4.4.2","v4.4.2rc0","v4.4.3","v4.4.3rc0","v4.4.4","v4.4.4rc0","v4.4.5","v4.4.5rc0","v4.4.6","v4.4.6rc0","v4.4.7","v4.4.7rc0","v4.4.8","v4.4.8rc0","v4.4.9","v4.4.9rc0","v4.6.0","v4.6.1","v4.6.1rc0","v4.6.2","v4.6.2rc0","v4.6.3","v4.6.3rc0","v4.6.4rc0","v4.6.7rc0","wireshark-4.4.0","wireshark-4.4.1","wireshark-4.4.2","wireshark-4.4.3","wireshark-4.4.4","wireshark-4.4.5","wireshark-4.4.6","wireshark-4.4.7","wireshark-4.4.8","wireshark-4.4.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-3201.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"cdfb6721e77c19d43f4787f66e9d5f2525281a22"},{"fixed":"93282876538d78a2927108dd71ee0ff370aedb0a"},{"introduced":"009a163470b581c7d3ee66d89c819cef1f9e50fe"},{"fixed":"2e231b8d9926750a68f69a0ed5f80af3cacfe9c3"}],"database_specific":{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"4.6.0"},{"fixed":"4.6.4"},{"introduced":"4.4.0"},{"fixed":"4.4.14"}]}}],"versions":["v4.4.0","v4.4.1","v4.4.10","v4.4.10rc0","v4.4.11","v4.4.11rc0","v4.4.12","v4.4.12rc0","v4.4.13","v4.4.13rc0","v4.4.14rc0","v4.4.1rc0","v4.4.2","v4.4.2rc0","v4.4.3","v4.4.3rc0","v4.4.4","v4.4.4rc0","v4.4.5","v4.4.5rc0","v4.4.6","v4.4.6rc0","v4.4.7","v4.4.7rc0","v4.4.8","v4.4.8rc0","v4.4.9","v4.4.9rc0","v4.6.0","v4.6.1","v4.6.1rc0","v4.6.2","v4.6.2rc0","v4.6.3","v4.6.3rc0","v4.6.4rc0","wireshark-4.4.0","wireshark-4.4.1","wireshark-4.4.2","wireshark-4.4.3","wireshark-4.4.4","wireshark-4.4.5","wireshark-4.4.6","wireshark-4.4.7","wireshark-4.4.8","wireshark-4.4.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-3201.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}