CVE Details for CVE: CVE-2023-2952
Summary
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
Timestamps | |
---|---|
Last major update | 13-01-2025 - 20:15 |
Published | 30-05-2023 - 23:15 |
Last modified | 13-01-2025 - 20:15 |
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
- https://gitlab.com/wireshark/wireshark/-/issues/19100
- https://gitlab.com/wireshark/wireshark/-/issues/19100
- https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
- https://security.gentoo.org/glsa/202309-02
- https://security.gentoo.org/glsa/202309-02
- https://www.debian.org/security/2023/dsa-5429
- https://www.debian.org/security/2023/dsa-5429
- https://www.wireshark.org/security/wnpa-sec-2023-20.html
- https://www.wireshark.org/security/wnpa-sec-2023-20.html
Vulnerable Configurations
-
cpe:2.3:a:wireshark:wireshark:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.7:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.8:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.10:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.11:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.12:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:3.6.13:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:3.6.13:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:4.0.5:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
CWE
CVSS
Base
None
Impact
Exploitability
Access
Vector | Complexity | Authentication |
---|---|---|
Impact
Confidentiality | Integrity | Availability |
---|---|---|
CVSS3
Base
6.5
Impact
3.6
Exploitability
2.8
Access
Attack Complexity | Attack vector | Privileges Required | Scope | User Interaction |
---|---|---|---|---|
LOW | NETWORK | NONE | UNCHANGED | REQUIRED |
Impact
Confidentiality | Integrity | Availability |
---|---|---|
NONE | NONE | HIGH |
VIA4 references
cvss3-vector
via4