Kaspersky ID:
KLA91016
Fecha de detección:
04/29/2026
Actualizado:
05/04/2026

Descripción

Multiple vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in Monero protocol dissector can be exploited to cause a denial of service.
  2. A denial of service vulnerability in BT-DHT protocol dissector can be exploited to cause a denial of service.
  3. A denial of service vulnerability in FC-SWILS protocol dissector can be exploited to cause a denial of service.
  4. Infinite loop vulnerability in SMB2 protocol dissector can be exploited to cause a denial of service.
  5. A denial of service vulnerability in ICMPv6 PvD protocol dissector can be exploited to cause a denial of service.
  6. A denial of service vulnerability in AFP Spotlight protocol dissector can be exploited to cause a denial of service.
  7. A denial of service vulnerability in K12 RF5 file parser can be exploited to cause a denial of service.
  8. A vulnerability in SBC codec can be exploited to cause denial of service or execute arbitrary code.
  9. A vulnerability in RDP protocol dissector can be exploited to cause denial of service or execute arbitrary code.
  10. A denial of service vulnerability in AMR-NB codec can be exploited to cause a denial of service.
  11. A denial of service vulnerability in iLBC codec can be exploited to cause a denial of service.
  12. Profile import path traversal vulnerability in Wireshark can be exploited to cause denial of service or execute arbitrary code.
  13. A denial of service vulnerability in DCP-ETSI protocol dissector can be exploited to cause a denial of service.
  14. A denial of service vulnerability in BEEP protocol dissector can be exploited to cause a denial of service.
  15. A denial of service vulnerability in ZigBee protocol dissector can be exploited to cause a denial of service.
  16. Dissection engine zlib decompression vulnerability can be exploited to cause a denial of service.
  17. Infinite loop vulnerability in USB HID protocol dissector can be exploited to cause a denial of service.
  18. Dissection engine LZ77 decompression vulnerability can be exploited to cause a denial of service.
  19. A denial of service vulnerability in Kismet protocol dissector can be exploited to cause a denial of service.
  20. Infinite loop vulnerability in SANE protocol dissector can be exploited to cause a denial of service.
  21. A denial of service vulnerability in iLBC audio codec can be exploited to cause a denial of service.
  22. A denial of service vulnerability in ASN.1 PER protocol dissector can be exploited to cause a denial of service.
  23. A denial of service vulnerability in MySQL protocol dissector can be exploited to cause a denial of service.
  24. Infinite loop vulnerability in GNW protocol dissector can be exploited to cause a denial of service.
  25. Infinite loop vulnerability in OpenFlow v5 protocol dissector can be exploited to cause a denial of service.
  26. Infinite loop vulnerability in OpenFlow v6 protocol dissector can be exploited to cause a denial of service.
  27. Infinite loop vulnerability in MBIM protocol dissector can be exploited to cause a denial of service.
  28. Infinite loop vulnerability in RPKI-Router protocol dissector can be exploited to cause a denial of service.
  29. A denial of service vulnerability in GSM RP protocol dissector can be exploited to cause a denial of service.
  30. A denial of service vulnerability in WebSocket protocol dissector can be exploited to cause a denial of service.
  31. A denial of service vulnerability in SMB2 protocol dissector can be exploited to cause a denial of service.
  32. A denial of service vulnerability in HTTP protocol dissector can be exploited to cause a denial of service.

Notas informativas originales

Explotación

Public exploits exist for this vulnerability.

Productos relacionados

Lista CVE

  • CVE-2026-6868
    critical
  • CVE-2026-5299
    high
  • CVE-2026-5401
    high
  • CVE-2026-5406
    high
  • CVE-2026-5407
    high
  • CVE-2026-5408
    high
  • CVE-2026-5409
    high
  • CVE-2026-5653
    critical
  • CVE-2026-5654
    critical
  • CVE-2026-5657
    critical
  • CVE-2026-6519
    critical
  • CVE-2026-6520
    critical
  • CVE-2026-6521
    high
  • CVE-2026-6522
    high
  • CVE-2026-6523
    high
  • CVE-2026-6524
    high
  • CVE-2026-6527
    high
  • CVE-2026-6529
    high
  • CVE-2026-6530
    high
  • CVE-2026-6531
    high
  • CVE-2026-6532
    high
  • CVE-2026-6533
    high
  • CVE-2026-6534
    high
  • CVE-2026-6535
    high
  • CVE-2026-6537
    high
  • CVE-2026-6538
    high
  • CVE-2026-6867
    high
  • CVE-2026-6869
    high
  • CVE-2026-6870
    high
  • CVE-2026-5403
    critical
  • CVE-2026-5404
    high
  • CVE-2026-5405
    critical
  • CVE-2026-5656
    critical

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.