<Vulnerability name="CVE-2026-6538">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-04-30T05:38:34</PublicDate>
    <Bugzilla id="2464044" url="https://bugzilla.redhat.com/show_bug.cgi?id=2464044" xml:lang="en:us">
Wireshark: Wireshark: Denial of Service via BEEP protocol dissector crash
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>6.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-1286</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Wireshark. A remote attacker could exploit a crash in the BEEP (Blocks Extensible Exchange Protocol) dissector by crafting a malicious BEEP packet. This vulnerability leads to a Denial of Service (DoS), causing Wireshark to become unresponsive.
    </Details>
    <Mitigation xml:lang="en:us">
To mitigate this issue, disable the BEEP protocol dissector in Wireshark. This prevents the application from processing BEEP packets, thereby avoiding the vulnerability. This action can be performed within Wireshark's protocol preferences. Disabling the BEEP dissector will prevent analysis of BEEP protocol traffic.
    </Mitigation>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-6538
https://nvd.nist.gov/vuln/detail/CVE-2026-6538
https://gitlab.com/wireshark/wireshark/-/issues/21120
https://www.wireshark.org/security/wnpa-sec-2026-23.html
    </References>
</Vulnerability>