UBUNTU-CVE-2023-2906

Source
https://ubuntu.com/security/CVE-2023-2906
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-2906.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-2906
Upstream
Published
2023-08-25T21:15:00Z
Modified
2025-07-18T16:53:59Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.

References

Affected packages

Ubuntu:Pro:20.04:LTS / wireshark

Package

Name
wireshark
Purl
pkg:deb/ubuntu/wireshark@3.2.3-1ubuntu0.1~esm2?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.5-1
3.0.7-1
3.2.1-1
3.2.2-1
3.2.3-1
3.2.3-1ubuntu0.1~esm1
3.2.3-1ubuntu0.1~esm2

Ubuntu:22.04:LTS / wireshark

Package

Name
wireshark
Purl
pkg:deb/ubuntu/wireshark@3.6.2-2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.4.7-1~exp1
3.4.9-1
3.6.2-1ubuntu1
3.6.2-2