CVE-2026-0962

Source
https://cve.org/CVERecord?id=CVE-2026-0962
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-0962.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-0962
Downstream
Published
2026-01-14T20:23:38.829Z
Modified
2026-02-23T02:05:14.091870Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Out-of-bounds Write in Wireshark
Details

SOME/IP-SD protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service

Database specific
{
    "cna_assigner": "GitLab",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/0xxx/CVE-2026-0962.json",
    "cwe_ids": [
        "CWE-787"
    ]
}
References

Affected packages

Git / github.com/wireshark/wireshark

Affected versions

v4.*
v4.6.0
v4.6.1
v4.6.1rc0
v4.6.2
v4.6.2rc0
v4.6.3rc0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-0962.json"

Git / gitlab.com/wireshark/wireshark

Affected ranges

Type
GIT
Repo
https://gitlab.com/wireshark/wireshark
Events
Database specific
{
    "versions": [
        {
            "introduced": "4.6.0"
        },
        {
            "fixed": "4.6.3"
        }
    ]
}
Type
GIT
Repo
https://gitlab.com/wireshark/wireshark
Events
Database specific
{
    "versions": [
        {
            "introduced": "4.4.0"
        },
        {
            "fixed": "4.4.13"
        }
    ]
}

Affected versions

v4.*
v4.4.0
v4.4.1
v4.4.10
v4.4.10rc0
v4.4.11
v4.4.11rc0
v4.4.12
v4.4.12rc0
v4.4.13rc0
v4.4.1rc0
v4.4.2
v4.4.2rc0
v4.4.3
v4.4.3rc0
v4.4.4
v4.4.4rc0
v4.4.5
v4.4.5rc0
v4.4.6
v4.4.6rc0
v4.4.7
v4.4.7rc0
v4.4.8
v4.4.8rc0
v4.4.9
v4.4.9rc0
v4.6.0
v4.6.1
v4.6.1rc0
v4.6.2
v4.6.2rc0
v4.6.3rc0
wireshark-4.*
wireshark-4.4.0
wireshark-4.4.1
wireshark-4.4.2
wireshark-4.4.3
wireshark-4.4.4
wireshark-4.4.5
wireshark-4.4.6
wireshark-4.4.7
wireshark-4.4.8
wireshark-4.4.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-0962.json"