{"id":"CVE-2018-6836","details":"The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.","modified":"2026-03-14T09:30:28.749032Z","published":"2018-02-08T07:29:01.197Z","references":[{"type":"WEB","url":"https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=28960d79cca262ac6b974f339697b299a1e28fef"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397"},{"type":"FIX","url":"https://code.wireshark.org/review/#/c/25660/"},{"type":"FIX","url":"https://code.wireshark.org/review/#/c/25660/2/wiretap/netmon.c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"0"},{"last_affected":"90a7be11a4fdc292f2af40cd49ad7e1bce335dfc"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.4.4"}]}}],"versions":["backups/ethereal@18706","ethereal-0-3-15","ethereal-0.3.15","start","v1.11.0","v1.11.0-rc1","v1.11.1","v1.11.1-rc1","v1.11.2","v1.11.2-rc1","v1.11.3","v1.11.3-rc1","v1.11.4-rc1","v1.99.0","v1.99.0-rc1","v1.99.1","v1.99.10rc0","v1.99.1rc0","v1.99.2","v1.99.2rc0","v1.99.3","v1.99.3rc0","v1.99.4","v1.99.4rc0","v1.99.5","v1.99.5rc0","v1.99.6","v1.99.6rc0","v1.99.7","v1.99.7rc0","v1.99.8","v1.99.8rc0","v1.99.9","v1.99.9rc0","v2.1.0","v2.1.0rc0","v2.1.1","v2.1.1rc0","v2.1.2rc0","v2.3.0rc0","v2.4.0","v2.4.0rc0","v2.4.0rc1","v2.4.0rc2","v2.4.1","v2.4.1rc0","v2.4.2","v2.4.2rc0","v2.4.3","v2.4.3rc0","v2.4.4","v2.4.4rc0","wireshark-1.11.3","wireshark-1.99.0","wireshark-1.99.1","wireshark-1.99.2","wireshark-1.99.3","wireshark-1.99.4","wireshark-1.99.5","wireshark-1.99.6","wireshark-1.99.7","wireshark-1.99.8","wireshark-1.99.9","wireshark-2.1.0","wireshark-2.1.1","wireshark-2.4.0","wireshark-2.4.1","wireshark-2.4.2","wireshark-2.4.3","wireshark-2.4.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-6836.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}