Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-6175

Опубликовано: 15 нояб. 2023
Источник: redhat
CVSS3: 6.6

Описание

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

A heap-based buffer overflow was found in Wireshark's NetScreen file parser. This issue may allow local arbitrary code execution via a crafted capture file.

Отчет

Although arbitrary code execution may be possible, default memory protections in Red Hat Enterprise Linux should prevent this flaw from causing a higher impact than an application crash. Wireshark is not an application that runs with elevated privileges, limiting the exploitability and impact of this issue to the user's context. Therefore, the severity score is set to Moderate.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6wiresharkOut of support scope
Red Hat Enterprise Linux 7wiresharkOut of support scope
Red Hat Enterprise Linux 8wiresharkWill not fix
Red Hat Enterprise Linux 9wiresharkWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2250151wireshark: NetScreen File Parsing Heap-based Buffer Overflow

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 года назад

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

CVSS3: 7.8
nvd
около 1 года назад

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

CVSS3: 7.8
debian
около 1 года назад

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to ...

suse-cvrf
больше 1 года назад

Security update for wireshark

CVSS3: 7.8
github
около 1 года назад

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

6.6 Medium

CVSS3

Уязвимость CVE-2023-6175