CVE Details for CVE: CVE-2021-39923
Summary
Large loop in the PNRP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
Timestamps | |
---|---|
Last major update | 09-03-2022 - 21:42 |
Published | 19-11-2021 - 17:15 |
Last modified | 09-03-2022 - 21:42 |
References
Vulnerable Configurations
-
cpe:2.3:a:wireshark:wireshark:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.7:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.8:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.9:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.10:-:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.10:-:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.10:rc0:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.10:rc0:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.11:-:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.11:-:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.11:rc0:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.11:rc0:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.12:-:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.12:-:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.12:rc0:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.12:rc0:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.13:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.13:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.14:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.14:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.15:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.15:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.16:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.16:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.2.17:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.2.17:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.7:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.8:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.4.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.4.9:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CWE
CVSS
Base
5.0
Impact
2.9
Exploitability
10.0
Access
Vector | Complexity | Authentication |
---|---|---|
NETWORK | LOW | NONE |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | PARTIAL |
CVSS3
Base
7.5
Impact
3.6
Exploitability
3.9
Access
Attack Complexity | Attack vector | Privileges Required | Scope | User Interaction |
---|---|---|---|---|
LOW | NETWORK | NONE | UNCHANGED | NONE |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | HIGH |