CVE-2021-4182

Source: cve@gitlab.com

HIGH
7.5
Published: December 30, 2021 at 10:15 PM
Modified: November 3, 2025 at 10:15 PM

Vulnerability Description

Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file

CVSS Metrics

Base Score
7.5
Severity
HIGH
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses (CWE)

Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Wireshark, a widely used network protocol analyzer, is vulnerable to a denial-of-service (DoS) attack. By crafting a malicious packet or capture file, an attacker can trigger a crash in the RFC 7468 dissector, rendering the application unusable and potentially disrupting network analysis operations. This vulnerability poses a risk to any system using Wireshark to analyze network traffic, including security teams and network administrators.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: An attacker crafts a malicious packet or capture file containing a specially crafted RFC 7468 encoded certificate.

Step 2: Packet Capture/Injection: The crafted packet is either injected into the network or loaded as a capture file into Wireshark.

Step 3: Dissection Trigger: Wireshark's RFC 7468 dissector processes the malicious packet.

Step 4: Vulnerability Exploitation: The dissector encounters the crafted input and attempts to parse it, leading to a memory access violation or other error.

Step 5: Denial of Service: The error condition causes Wireshark to crash, resulting in a denial of service.

03 // Deep Technical Analysis

The vulnerability lies within the RFC 7468 dissector in Wireshark, specifically in how it handles malformed or crafted packets. The dissector likely fails to properly validate input data, leading to a memory access violation or other error condition. This can occur during the parsing of ASN.1 encoded data within the RFC 7468 format. The root cause is likely an unchecked access to a data structure, leading to a buffer overflow or an attempt to dereference an invalid pointer. The crafted input causes the dissector to enter an unexpected state, triggering the crash. The specific function or logic flaw is likely related to the parsing of the certificate data, where the dissector attempts to read beyond the allocated buffer or misinterprets the data length.

04 // Exploitation Status

Public PoC is likely available. The vulnerability is relatively easy to exploit, and the impact is a denial of service. While not directly exploitable for remote code execution, it can disrupt network analysis and potentially be chained with other vulnerabilities.

05 // Threat Intelligence

While no specific APTs are directly linked to this CVE, any threat actor seeking to disrupt network monitoring or analysis could leverage this vulnerability. This could include state-sponsored actors, cybercriminals, and hacktivists. Not listed in CISA KEV.

06 // Detection & Hunting

  • Monitor network traffic for unusual RFC 7468 encoded certificate data, especially with unexpected lengths or malformed structures.

  • Analyze Wireshark crash logs for error messages related to the RFC 7468 dissector.

  • Implement network intrusion detection systems (IDS) rules to identify and block malicious packets containing the crafted RFC 7468 data.

  • Monitor for unexpected Wireshark process terminations or restarts.

07 // Remediation & Hardening

  • Upgrade Wireshark to a patched version (3.6.1 or later, or 3.4.11 or later).

  • Restrict access to Wireshark instances, especially those used for network capture and analysis.

  • Implement network segmentation to isolate Wireshark instances from critical network segments.

  • Regularly update Wireshark and other software to patch known vulnerabilities.

  • Consider using a network intrusion prevention system (IPS) to filter malicious packets before they reach Wireshark.

08 // Affected Products

Wireshark 3.6.0Wireshark 3.4.0 to 3.4.10

09 // Discovered Proof of Concept Links

Advertisement

References & Intelligence

https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json
Source: cve@gitlab.com
Third Party Advisory
https://gitlab.com/wireshark/wireshark/-/issues/17801
Source: cve@gitlab.com
ExploitIssue TrackingThird Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q6XGBKWSQFCVYUN4ZK3O3NJIFP3OAFVT/
Source: cve@gitlab.com
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5AEK3XTOIOGCGUILUFISMGX54YJXWGJ/
Source: cve@gitlab.com
https://security.gentoo.org/glsa/202210-04
Source: cve@gitlab.com
Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
Source: cve@gitlab.com
PatchThird Party Advisory
https://www.wireshark.org/security/wnpa-sec-2021-20.html
Source: cve@gitlab.com
Vendor Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://gitlab.com/wireshark/wireshark/-/issues/17801
Source: af854a3a-2127-422b-91ae-364da2661108
ExploitIssue TrackingThird Party Advisory
https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q6XGBKWSQFCVYUN4ZK3O3NJIFP3OAFVT/
Source: af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5AEK3XTOIOGCGUILUFISMGX54YJXWGJ/
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.gentoo.org/glsa/202210-04
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
Source: af854a3a-2127-422b-91ae-364da2661108
PatchThird Party Advisory
https://www.wireshark.org/security/wnpa-sec-2021-20.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory