Kaspersky ID:
KLA91016
Bulunma tarihi:
04/29/2026
Yüklendi:
05/04/2026

Açıklama

Multiple vulnerabilities were found in Wireshark. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in Monero protocol dissector can be exploited to cause a denial of service.
  2. A denial of service vulnerability in BT-DHT protocol dissector can be exploited to cause a denial of service.
  3. A denial of service vulnerability in FC-SWILS protocol dissector can be exploited to cause a denial of service.
  4. Infinite loop vulnerability in SMB2 protocol dissector can be exploited to cause a denial of service.
  5. A denial of service vulnerability in ICMPv6 PvD protocol dissector can be exploited to cause a denial of service.
  6. A denial of service vulnerability in AFP Spotlight protocol dissector can be exploited to cause a denial of service.
  7. A denial of service vulnerability in K12 RF5 file parser can be exploited to cause a denial of service.
  8. A vulnerability in SBC codec can be exploited to cause denial of service or execute arbitrary code.
  9. A vulnerability in RDP protocol dissector can be exploited to cause denial of service or execute arbitrary code.
  10. A denial of service vulnerability in AMR-NB codec can be exploited to cause a denial of service.
  11. A denial of service vulnerability in iLBC codec can be exploited to cause a denial of service.
  12. Profile import path traversal vulnerability in Wireshark can be exploited to cause denial of service or execute arbitrary code.
  13. A denial of service vulnerability in DCP-ETSI protocol dissector can be exploited to cause a denial of service.
  14. A denial of service vulnerability in BEEP protocol dissector can be exploited to cause a denial of service.
  15. A denial of service vulnerability in ZigBee protocol dissector can be exploited to cause a denial of service.
  16. Dissection engine zlib decompression vulnerability can be exploited to cause a denial of service.
  17. Infinite loop vulnerability in USB HID protocol dissector can be exploited to cause a denial of service.
  18. Dissection engine LZ77 decompression vulnerability can be exploited to cause a denial of service.
  19. A denial of service vulnerability in Kismet protocol dissector can be exploited to cause a denial of service.
  20. Infinite loop vulnerability in SANE protocol dissector can be exploited to cause a denial of service.
  21. A denial of service vulnerability in iLBC audio codec can be exploited to cause a denial of service.
  22. A denial of service vulnerability in ASN.1 PER protocol dissector can be exploited to cause a denial of service.
  23. A denial of service vulnerability in MySQL protocol dissector can be exploited to cause a denial of service.
  24. Infinite loop vulnerability in GNW protocol dissector can be exploited to cause a denial of service.
  25. Infinite loop vulnerability in OpenFlow v5 protocol dissector can be exploited to cause a denial of service.
  26. Infinite loop vulnerability in OpenFlow v6 protocol dissector can be exploited to cause a denial of service.
  27. Infinite loop vulnerability in MBIM protocol dissector can be exploited to cause a denial of service.
  28. Infinite loop vulnerability in RPKI-Router protocol dissector can be exploited to cause a denial of service.
  29. A denial of service vulnerability in GSM RP protocol dissector can be exploited to cause a denial of service.
  30. A denial of service vulnerability in WebSocket protocol dissector can be exploited to cause a denial of service.
  31. A denial of service vulnerability in SMB2 protocol dissector can be exploited to cause a denial of service.
  32. A denial of service vulnerability in HTTP protocol dissector can be exploited to cause a denial of service.

Orijinal öneriler

Kötüye kullanma

Public exploits exist for this vulnerability.

İlgili ürünler

CVE Listesi

  • CVE-2026-6868
    critical
  • CVE-2026-5299
    high
  • CVE-2026-5401
    high
  • CVE-2026-5406
    high
  • CVE-2026-5407
    high
  • CVE-2026-5408
    high
  • CVE-2026-5409
    high
  • CVE-2026-5653
    critical
  • CVE-2026-5654
    critical
  • CVE-2026-5657
    critical
  • CVE-2026-6519
    critical
  • CVE-2026-6520
    critical
  • CVE-2026-6521
    high
  • CVE-2026-6522
    high
  • CVE-2026-6523
    high
  • CVE-2026-6524
    high
  • CVE-2026-6527
    high
  • CVE-2026-6529
    high
  • CVE-2026-6530
    high
  • CVE-2026-6531
    high
  • CVE-2026-6532
    high
  • CVE-2026-6533
    high
  • CVE-2026-6534
    high
  • CVE-2026-6535
    high
  • CVE-2026-6537
    high
  • CVE-2026-6538
    high
  • CVE-2026-6867
    high
  • CVE-2026-6869
    high
  • CVE-2026-6870
    high
  • CVE-2026-5403
    critical
  • CVE-2026-5404
    high
  • CVE-2026-5405
    critical
  • CVE-2026-5656
    critical

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.