DEBIAN-CVE-2026-3203

Source
https://security-tracker.debian.org/tracker/CVE-2026-3203
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3203.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-3203
Upstream
Published
2026-02-25T15:20:55.973Z
Modified
2026-03-02T05:03:30.602102Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service

References

Affected packages

Debian:11 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.4.4-1
3.4.6-1~exp1
3.4.7-1~exp1
3.4.7-1
3.4.8-1
3.4.9-1
3.4.10-0+deb11u1
3.4.16-0+deb11u1
3.4.16-0+deb11u2
3.6.0~rc1-0exp1
3.6.0-1
3.6.2-1
3.6.2-2
3.6.3-1
3.6.5-1
3.6.6-1
3.6.7-1
3.6.8-1
4.*
4.0.0-1~exp0
4.0.0-1
4.0.1-1
4.0.2-1
4.0.3-1
4.0.5-1~exp1
4.0.6-1~deb12u1
4.0.6-1~exp1
4.0.6-1
4.0.7-1
4.0.8-1
4.0.10-1
4.0.11-1~deb12u1
4.0.11-1
4.2.0~rc3-1~exp1
4.2.0-1~exp0
4.2.0-1
4.2.2-1
4.2.2-1.1~exp1
4.2.2-1.1
4.2.4-1
4.2.5-1
4.2.5-2
4.2.6-1
4.4.0-0exp1
4.4.0-0exp2
4.4.0-1
4.4.1-1
4.4.2-1
4.4.3-1
4.4.4-1
4.4.5-1
4.4.6-1
4.4.6-2
4.4.7-0exp1
4.4.7-1
4.4.8-0exp1
4.4.9-1
4.6.0~rc1-0exp1
4.6.0~rc1-0exp2
4.6.0-0exp1
4.6.0-1
4.6.1-1
4.6.1-2
4.6.2-1
4.6.2-3
4.6.3-1
4.6.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3203.json"

Debian:12 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.0.3-1
4.0.5-1~exp1
4.0.6-1~deb12u1
4.0.6-1~exp1
4.0.6-1
4.0.7-1
4.0.8-1
4.0.10-1
4.0.11-1~deb12u1
4.0.11-1
4.0.17-0+deb12u1
4.2.0~rc3-1~exp1
4.2.0-1~exp0
4.2.0-1
4.2.2-1
4.2.2-1.1~exp1
4.2.2-1.1
4.2.4-1
4.2.5-1
4.2.5-2
4.2.6-1
4.4.0-0exp1
4.4.0-0exp2
4.4.0-1
4.4.1-1
4.4.2-1
4.4.3-1
4.4.4-1
4.4.5-1
4.4.6-1
4.4.6-2
4.4.7-0exp1
4.4.7-1
4.4.8-0exp1
4.4.9-1
4.6.0~rc1-0exp1
4.6.0~rc1-0exp2
4.6.0-0exp1
4.6.0-1
4.6.1-1
4.6.1-2
4.6.2-1
4.6.2-3
4.6.3-1
4.6.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3203.json"

Debian:13 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.4.7-1
4.4.8-0exp1
4.4.9-1
4.4.13-0+deb13u1
4.6.0~rc1-0exp1
4.6.0~rc1-0exp2
4.6.0-0exp1
4.6.0-1
4.6.1-1
4.6.1-2
4.6.2-1
4.6.2-3
4.6.3-1
4.6.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3203.json"

Debian:14 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.6.4-1

Affected versions

4.*
4.4.7-1
4.4.8-0exp1
4.4.9-1
4.6.0~rc1-0exp1
4.6.0~rc1-0exp2
4.6.0-0exp1
4.6.0-1
4.6.1-1
4.6.1-2
4.6.2-1
4.6.2-3
4.6.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3203.json"