CVE Details for CVE: CVE-2023-0666
Summary
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Timestamps | |
---|---|
Last major update | 07-01-2025 - 16:15 |
Published | 07-06-2023 - 03:15 |
Last modified | 07-01-2025 - 16:15 |
References
- https://gitlab.com/wireshark/wireshark/-/issues/19085
- https://gitlab.com/wireshark/wireshark/-/issues/19085
- https://security.gentoo.org/glsa/202309-02
- https://security.gentoo.org/glsa/202309-02
- https://takeonme.org/cves/CVE-2023-0666.html
- https://takeonme.org/cves/CVE-2023-0666.html
- https://www.debian.org/security/2023/dsa-5429
- https://www.debian.org/security/2023/dsa-5429
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/security/wnpa-sec-2023-18.html
- https://www.wireshark.org/security/wnpa-sec-2023-18.html
Vulnerable Configurations
-
cpe:2.3:a:wireshark:wireshark:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.5:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
CWE
CVSS
Base
None
Impact
Exploitability
Access
Vector | Complexity | Authentication |
---|---|---|
Impact
Confidentiality | Integrity | Availability |
---|---|---|
CVSS3
Base
6.5
Impact
3.6
Exploitability
2.8
Access
Attack Complexity | Attack vector | Privileges Required | Scope | User Interaction |
---|---|---|---|---|
LOW | NETWORK | NONE | UNCHANGED | REQUIRED |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | HIGH |
VIA4 references
cvss3-vector
via4