First published: Tue Jan 24 2023(Updated: )
Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=3.6.0<=3.6.10 | |
Wireshark Wireshark | >=4.0.0<=4.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-0411.
The severity of CVE-2023-0411 is medium with a severity value of 6.5.
Wireshark versions 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 are affected by CVE-2023-0411.
An attacker can exploit CVE-2023-0411 by performing denial of service through packet injection or using a crafted capture file.
Yes, you can find references for CVE-2023-0411 at the following links: [link1](https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json), [link2](https://gitlab.com/wireshark/wireshark/-/issues/18711), [link3](https://gitlab.com/wireshark/wireshark/-/issues/18720).