Description
Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file.
References (6)
Core 6
Core References
Vendor Advisory x_refsource_misc
https://www.wireshark.org/security/wnpa-sec-2021-03.html
Issue Tracking, Third Party Advisory x_refsource_misc
https://gitlab.com/wireshark/wireshark/-/issues/17232
Third Party Advisory x_refsource_confirm
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22191.json
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuApr2021.html
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202107-21
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/03/msg00041.html
Scores
CVSS v3
6.3
EPSS
0.0027
EPSS Percentile
50.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Details
CWE
CWE-74
Status
published
Products (3)
debian/debian_linux
9.0
oracle/zfs_storage_appliance
8.8
wireshark/wireshark
3.2.0 - 3.2.11
Published
Mar 15, 2021
Tracked Since
Feb 18, 2026