CVE-2023-0668

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-0668
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0668.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-0668
Related
Published
2023-06-07T03:15:09Z
Modified
2024-06-06T14:13:52.595249Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.

References

Affected packages

Git / github.com/wireshark/wireshark

Affected ranges

Type
GIT
Repo
https://github.com/wireshark/wireshark
Events

Affected versions

v3.*

v3.6.0
v3.6.1
v3.6.10
v3.6.10rc0
v3.6.11
v3.6.11rc0
v3.6.12
v3.6.12rc0
v3.6.13
v3.6.13rc0
v3.6.14rc0
v3.6.1rc0
v3.6.2
v3.6.2rc0
v3.6.3
v3.6.3rc0
v3.6.4
v3.6.4rc0
v3.6.5
v3.6.5rc0
v3.6.6
v3.6.6rc0
v3.6.7
v3.6.7rc0
v3.6.8
v3.6.8rc0
v3.6.9
v3.6.9rc0

wireshark-3.*

wireshark-3.6.0
wireshark-3.6.1
wireshark-3.6.10
wireshark-3.6.11
wireshark-3.6.12
wireshark-3.6.13
wireshark-3.6.2
wireshark-3.6.3
wireshark-3.6.4
wireshark-3.6.5
wireshark-3.6.6
wireshark-3.6.7
wireshark-3.6.8
wireshark-3.6.9