Unrated severityNVD Advisory· Published Oct 27, 2022· Updated May 9, 2025
CVE-2022-3725
CVE-2022-3725
Description
Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file
Affected products
27- osv-coords26 versionspkg:rpm/opensuse/wireshark&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/wireshark&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/wireshark&distro=openSUSE%20Tumbleweedpkg:rpm/suse/wireshark&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/wireshark&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP4pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/wireshark&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/wireshark&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/wireshark&distro=SUSE%20Manager%20Server%204.1
< 3.6.10-150000.3.78.1+ 25 more
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 4.2.6-3.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
- (no CPE)range: < 3.6.10-150000.3.78.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIEIFFZ27YKCTK5C2VT4OEQSHPQDBNSF/mitrevendor-advisory
- security.gentoo.org/glsa/202309-02mitrevendor-advisory
- gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3725.jsonmitre
- gitlab.com/wireshark/wireshark/-/issues/18378mitre
- www.wireshark.org/security/wnpa-sec-2022-07.htmlmitre
News mentions
0No linked articles in our index yet.