CVE-2021-22191
Gentoo Linux Security Advisory 202107-21
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file.
Un manejo inapropiado de la URL en Wireshark versiones 3.4.0 hasta 3.4.3 y versiones 3.2.0 hasta 3.2.1,1 podría permitir una ejecución de código remota por medio de una inyección de paquetes o un archivo de captura diseñado
An update that solves 9 vulnerabilities and has two fixes is now available. This update for wireshark, libvirt, sbc and libqt5-qtmultimedia fixes the following issues. Update wireshark to version 3.4.5 Including security fixes for. Wireshark could open unsafe URLs. MS-WSP dissector excessive memory consumption QUIC dissector crash Kafka dissector memory leak Multiple dissector memory leaks RTPS dissector memory leak USB HID dissector crash. Fixed USB HID dissector memory leak. Fixed USB HID dissector crash libqt5-qtmultimedia and sbc are necessary dependencies. Libvirt is needed to rebuild wireshark-plugin-libvirt.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-05 CVE Reserved
- 2021-03-11 CVE Published
- 2024-08-03 CVE Updated
- 2025-06-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22191.json | Third Party Advisory | |
https://gitlab.com/wireshark/wireshark/-/issues/17232 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2022/03/msg00041.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.oracle.com/security-alerts/cpuApr2021.html | 2022-05-27 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202107-21 | 2022-05-27 | |
https://www.wireshark.org/security/wnpa-sec-2021-03.html | 2022-05-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | >= 3.2.0 <= 3.2.11 Search vendor "Wireshark" for product "Wireshark" and version " >= 3.2.0 <= 3.2.11" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | >= 3.4.0 <= 3.4.3 Search vendor "Wireshark" for product "Wireshark" and version " >= 3.4.0 <= 3.4.3" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Zfs Storage Appliance Search vendor "Oracle" for product "Zfs Storage Appliance" | 8.8 Search vendor "Oracle" for product "Zfs Storage Appliance" and version "8.8" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|