CVE-2021-39924 - log back

CVE-2021-39924 edited at 17 Nov 2021 20:52:50
Description
- It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed Bluetooth DHT packet onto the wire or by convincing someone to read a malformed packet trace file.
+ It may be possible to make Wireshark before version 3.4.10 consume excessive CPU resources by injecting a malformed Bluetooth DHT packet onto the wire or by convincing someone to read a malformed packet trace file.
References
https://www.wireshark.org/security/wnpa-sec-2021-10
https://gitlab.com/wireshark/wireshark/-/issues/17677
https://gitlab.com/wireshark/wireshark/-/merge_requests/4815
https://gitlab.com/wireshark/wireshark/-/commit/d3c762dcb634fcca070deed1f5d17b791ce84166
Notes
CVE-2021-39924 edited at 17 Nov 2021 20:51:41
Severity
- Unknown
+ Low
Remote
- Unknown
+ Remote
Type
- Unknown
+ Denial of service
Description
+ It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed Bluetooth DHT packet onto the wire or by convincing someone to read a malformed packet trace file.
References
+ https://www.wireshark.org/security/wnpa-sec-2021-10
+ https://gitlab.com/wireshark/wireshark/-/issues/17677
+ https://gitlab.com/wireshark/wireshark/-/merge_requests/4815
+ https://gitlab.com/wireshark/wireshark/-/commit/d3c762dcb634fcca070deed1f5d17b791ce84166
CVE-2021-39924 created at 17 Nov 2021 20:44:47