CVE Details for CVE: CVE-2023-0668
Summary
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Timestamps | |
---|---|
Last major update | 20-10-2023 - 20:56 |
Published | 07-06-2023 - 03:15 |
Last modified | 20-10-2023 - 20:56 |
References
- https://takeonme.org/cves/CVE-2023-0668.html
- https://gitlab.com/wireshark/wireshark/-/issues/19087
- https://www.wireshark.org/security/wnpa-sec-2023-19.html
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.debian.org/security/2023/dsa-5429
- https://security.gentoo.org/glsa/202309-02
Vulnerable Configurations
-
cpe:2.3:a:wireshark:wireshark:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.7:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.8:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.10:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.11:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.12:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.13:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.13:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.5:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
CWE
CVSS
Base
None
Impact
Exploitability
Access
Vector | Complexity | Authentication |
---|---|---|
Impact
Confidentiality | Integrity | Availability |
---|---|---|
CVSS3
Base
6.5
Impact
3.6
Exploitability
2.8
Access
Attack Complexity | Attack vector | Privileges Required | Scope | User Interaction |
---|---|---|---|---|
LOW | NETWORK | NONE | UNCHANGED | REQUIRED |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | HIGH |
VIA4 references
cvss3-vector
via4