Kaspersky ID:
KLA91016
Erkennungsdatum:
04/29/2026
Aktualisiert:
05/04/2026

Beschreibung

Multiple vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in Monero protocol dissector can be exploited to cause a denial of service.
  2. A denial of service vulnerability in BT-DHT protocol dissector can be exploited to cause a denial of service.
  3. A denial of service vulnerability in FC-SWILS protocol dissector can be exploited to cause a denial of service.
  4. Infinite loop vulnerability in SMB2 protocol dissector can be exploited to cause a denial of service.
  5. A denial of service vulnerability in ICMPv6 PvD protocol dissector can be exploited to cause a denial of service.
  6. A denial of service vulnerability in AFP Spotlight protocol dissector can be exploited to cause a denial of service.
  7. A denial of service vulnerability in K12 RF5 file parser can be exploited to cause a denial of service.
  8. A vulnerability in SBC codec can be exploited to cause denial of service or execute arbitrary code.
  9. A vulnerability in RDP protocol dissector can be exploited to cause denial of service or execute arbitrary code.
  10. A denial of service vulnerability in AMR-NB codec can be exploited to cause a denial of service.
  11. A denial of service vulnerability in iLBC codec can be exploited to cause a denial of service.
  12. Profile import path traversal vulnerability in Wireshark can be exploited to cause denial of service or execute arbitrary code.
  13. A denial of service vulnerability in DCP-ETSI protocol dissector can be exploited to cause a denial of service.
  14. A denial of service vulnerability in BEEP protocol dissector can be exploited to cause a denial of service.
  15. A denial of service vulnerability in ZigBee protocol dissector can be exploited to cause a denial of service.
  16. Dissection engine zlib decompression vulnerability can be exploited to cause a denial of service.
  17. Infinite loop vulnerability in USB HID protocol dissector can be exploited to cause a denial of service.
  18. Dissection engine LZ77 decompression vulnerability can be exploited to cause a denial of service.
  19. A denial of service vulnerability in Kismet protocol dissector can be exploited to cause a denial of service.
  20. Infinite loop vulnerability in SANE protocol dissector can be exploited to cause a denial of service.
  21. A denial of service vulnerability in iLBC audio codec can be exploited to cause a denial of service.
  22. A denial of service vulnerability in ASN.1 PER protocol dissector can be exploited to cause a denial of service.
  23. A denial of service vulnerability in MySQL protocol dissector can be exploited to cause a denial of service.
  24. Infinite loop vulnerability in GNW protocol dissector can be exploited to cause a denial of service.
  25. Infinite loop vulnerability in OpenFlow v5 protocol dissector can be exploited to cause a denial of service.
  26. Infinite loop vulnerability in OpenFlow v6 protocol dissector can be exploited to cause a denial of service.
  27. Infinite loop vulnerability in MBIM protocol dissector can be exploited to cause a denial of service.
  28. Infinite loop vulnerability in RPKI-Router protocol dissector can be exploited to cause a denial of service.
  29. A denial of service vulnerability in GSM RP protocol dissector can be exploited to cause a denial of service.
  30. A denial of service vulnerability in WebSocket protocol dissector can be exploited to cause a denial of service.
  31. A denial of service vulnerability in SMB2 protocol dissector can be exploited to cause a denial of service.
  32. A denial of service vulnerability in HTTP protocol dissector can be exploited to cause a denial of service.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Betroffene Produkte

CVE Liste

  • CVE-2026-6868
    critical
  • CVE-2026-5299
    high
  • CVE-2026-5401
    high
  • CVE-2026-5406
    high
  • CVE-2026-5407
    high
  • CVE-2026-5408
    high
  • CVE-2026-5409
    high
  • CVE-2026-5653
    critical
  • CVE-2026-5654
    critical
  • CVE-2026-5657
    critical
  • CVE-2026-6519
    critical
  • CVE-2026-6520
    critical
  • CVE-2026-6521
    high
  • CVE-2026-6522
    high
  • CVE-2026-6523
    high
  • CVE-2026-6524
    high
  • CVE-2026-6527
    high
  • CVE-2026-6529
    high
  • CVE-2026-6530
    high
  • CVE-2026-6531
    high
  • CVE-2026-6532
    high
  • CVE-2026-6533
    high
  • CVE-2026-6534
    high
  • CVE-2026-6535
    high
  • CVE-2026-6537
    high
  • CVE-2026-6538
    high
  • CVE-2026-6867
    high
  • CVE-2026-6869
    high
  • CVE-2026-6870
    high
  • CVE-2026-5403
    critical
  • CVE-2026-5404
    high
  • CVE-2026-5405
    critical
  • CVE-2026-5656
    critical

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.