K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Project Subscriptions

Vendors Products
Wireshark Subscribe
Wireshark Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-6249-1 wireshark security update
Fixes

Solution

Upgrade to version 4.6.5 or above


Workaround

No workaround given by the vendor.

History

Mon, 04 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1286
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 01 May 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

Fri, 01 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-05-01T14:20:15.602Z

Reserved: 2026-04-02T06:33:21.683Z

Link: CVE-2026-5404

cve-icon Vulnrichment

Updated: 2026-05-01T14:20:07.654Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-01T00:16:24.820

Modified: 2026-05-01T19:22:11.793

Link: CVE-2026-5404

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-30T23:04:08Z

Links: CVE-2026-5404 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T14:00:20Z

Weaknesses