Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-0667

Опубликовано: 07 июн. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

A flaw was found in the Wireshark package. Due to failure in validating the length provided by an attacker-crafted MS-MMS packet, Wireshark, in an unusual configuration, is susceptible to a heap-based buffer overflow. This issue may result in a crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6wiresharkOut of support scope
Red Hat Enterprise Linux 7wiresharkWill not fix
Red Hat Enterprise Linux 8wiresharkWill not fix
Red Hat Enterprise Linux 9wiresharkWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2229692wireshark: incorrect length validation may lead to a heap-based buffer overflow

EPSS

Процентиль: 42%
0.00203
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

CVSS3: 6.5
nvd
больше 2 лет назад

Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

CVSS3: 6.5
msrc
больше 2 лет назад

Wireshark MSMMS parsing buffer overflow

CVSS3: 6.5
debian
больше 2 лет назад

Due to failure in validating the length provided by an attacker-crafte ...

CVSS3: 9.8
github
больше 2 лет назад

Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

EPSS

Процентиль: 42%
0.00203
Низкий

6.5 Medium

CVSS3