Kaspersky ID:
KLA91016
Дата обнаружения:
29/04/2026
Обновлено:
04/05/2026

Описание

Multiple vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in Monero protocol dissector can be exploited to cause a denial of service.
  2. A denial of service vulnerability in BT-DHT protocol dissector can be exploited to cause a denial of service.
  3. A denial of service vulnerability in FC-SWILS protocol dissector can be exploited to cause a denial of service.
  4. Infinite loop vulnerability in SMB2 protocol dissector can be exploited to cause a denial of service.
  5. A denial of service vulnerability in ICMPv6 PvD protocol dissector can be exploited to cause a denial of service.
  6. A denial of service vulnerability in AFP Spotlight protocol dissector can be exploited to cause a denial of service.
  7. A denial of service vulnerability in K12 RF5 file parser can be exploited to cause a denial of service.
  8. A vulnerability in SBC codec can be exploited to cause denial of service or execute arbitrary code.
  9. A vulnerability in RDP protocol dissector can be exploited to cause denial of service or execute arbitrary code.
  10. A denial of service vulnerability in AMR-NB codec can be exploited to cause a denial of service.
  11. A denial of service vulnerability in iLBC codec can be exploited to cause a denial of service.
  12. Profile import path traversal vulnerability in Wireshark can be exploited to cause denial of service or execute arbitrary code.
  13. A denial of service vulnerability in DCP-ETSI protocol dissector can be exploited to cause a denial of service.
  14. A denial of service vulnerability in BEEP protocol dissector can be exploited to cause a denial of service.
  15. A denial of service vulnerability in ZigBee protocol dissector can be exploited to cause a denial of service.
  16. Dissection engine zlib decompression vulnerability can be exploited to cause a denial of service.
  17. Infinite loop vulnerability in USB HID protocol dissector can be exploited to cause a denial of service.
  18. Dissection engine LZ77 decompression vulnerability can be exploited to cause a denial of service.
  19. A denial of service vulnerability in Kismet protocol dissector can be exploited to cause a denial of service.
  20. Infinite loop vulnerability in SANE protocol dissector can be exploited to cause a denial of service.
  21. A denial of service vulnerability in iLBC audio codec can be exploited to cause a denial of service.
  22. A denial of service vulnerability in ASN.1 PER protocol dissector can be exploited to cause a denial of service.
  23. A denial of service vulnerability in MySQL protocol dissector can be exploited to cause a denial of service.
  24. Infinite loop vulnerability in GNW protocol dissector can be exploited to cause a denial of service.
  25. Infinite loop vulnerability in OpenFlow v5 protocol dissector can be exploited to cause a denial of service.
  26. Infinite loop vulnerability in OpenFlow v6 protocol dissector can be exploited to cause a denial of service.
  27. Infinite loop vulnerability in MBIM protocol dissector can be exploited to cause a denial of service.
  28. Infinite loop vulnerability in RPKI-Router protocol dissector can be exploited to cause a denial of service.
  29. A denial of service vulnerability in GSM RP protocol dissector can be exploited to cause a denial of service.
  30. A denial of service vulnerability in WebSocket protocol dissector can be exploited to cause a denial of service.
  31. A denial of service vulnerability in SMB2 protocol dissector can be exploited to cause a denial of service.
  32. A denial of service vulnerability in HTTP protocol dissector can be exploited to cause a denial of service.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Связанные продукты

Список CVE

  • CVE-2026-6868
    critical
  • CVE-2026-5299
    high
  • CVE-2026-5401
    high
  • CVE-2026-5406
    high
  • CVE-2026-5407
    high
  • CVE-2026-5408
    high
  • CVE-2026-5409
    high
  • CVE-2026-5653
    critical
  • CVE-2026-5654
    critical
  • CVE-2026-5657
    critical
  • CVE-2026-6519
    critical
  • CVE-2026-6520
    critical
  • CVE-2026-6521
    high
  • CVE-2026-6522
    high
  • CVE-2026-6523
    high
  • CVE-2026-6524
    high
  • CVE-2026-6527
    high
  • CVE-2026-6529
    high
  • CVE-2026-6530
    high
  • CVE-2026-6531
    high
  • CVE-2026-6532
    high
  • CVE-2026-6533
    high
  • CVE-2026-6534
    high
  • CVE-2026-6535
    high
  • CVE-2026-6537
    high
  • CVE-2026-6538
    high
  • CVE-2026-6867
    high
  • CVE-2026-6869
    high
  • CVE-2026-6870
    high
  • CVE-2026-5403
    critical
  • CVE-2026-5404
    high
  • CVE-2026-5405
    critical
  • CVE-2026-5656
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Do you want to save your changes?
Your message has been sent successfully.