Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 17 Jun 2025 07:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat
         Redhat enterprise Linux  | 
|
| CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
| Vendors & Products | 
        
        Redhat
         Redhat enterprise Linux  | 
Thu, 10 Apr 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Wireshark
         Wireshark wireshark  | 
|
| CPEs | cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Wireshark
         Wireshark wireshark  | 
Fri, 21 Feb 2025 02:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        
        threat_severity
         
  | 
Thu, 20 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Thu, 20 Feb 2025 14:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        
        threat_severity
         
  | 
Thu, 20 Feb 2025 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file | |
| Title | Uncontrolled Recursion in Wireshark | |
| Weaknesses | CWE-674 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: GitLab
Published: 2025-02-20T01:30:46.055Z
Updated: 2025-02-20T14:22:12.035Z
Reserved: 2025-02-19T23:02:04.100Z
Link: CVE-2025-1492
Updated: 2025-02-20T14:22:07.054Z
Status : Analyzed
Published: 2025-02-20T02:15:38.553
Modified: 2025-04-10T20:03:01.333
Link: CVE-2025-1492