Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2020-26419
Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.004
EPSS Ranking
61.6%
CVSS Severity
CVSS v3 Score
3.1
CVSS v2 Score
5.0
References
https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26419.json
https://gitlab.com/wireshark/wireshark/-/issues/17032
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YHWDZPWQJMLK64VFDWJC5SEGPNH6Y72Z/
https://security.gentoo.org/glsa/202101-12
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.wireshark.org/security/wnpa-sec-2020-19.html
https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26419.json
https://gitlab.com/wireshark/wireshark/-/issues/17032
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YHWDZPWQJMLK64VFDWJC5SEGPNH6Y72Z/
https://security.gentoo.org/glsa/202101-12
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.wireshark.org/security/wnpa-sec-2020-19.html
Products affected by CVE-2020-26419
Oracle
»
Zfs Storage Appliance Kit
»
Version:
8.8
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8
Wireshark
»
Wireshark
»
Version:
3.4.0
cpe:2.3:a:wireshark:wireshark:3.4.0
Fedoraproject
»
Fedora
»
Version:
32
cpe:2.3:o:fedoraproject:fedora:32
Fedoraproject
»
Fedora
»
Version:
33
cpe:2.3:o:fedoraproject:fedora:33
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved