First published: Wed Jun 07 2023(Updated: )
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Credit: cve@takeonme.org cve@takeonme.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | <=3.4.10-0+deb11u1 | 2.6.20-0+deb10u4 2.6.20-0+deb10u7 4.0.6-1~deb12u1 4.0.10-1 |
Wireshark Wireshark | >=4.0.0<4.0.6 | |
Debian Debian Linux | =12.0 | |
Debian | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0666 is a vulnerability in Wireshark version 4.0.5 and prior that allows a heap-based buffer overflow and potentially code execution.
CVE-2023-0666 affects Wireshark versions 4.0.5 and prior, putting them at risk of a heap-based buffer overflow and possible code execution.
The severity of CVE-2023-0666 is medium, with a severity value of 6.5.
To fix CVE-2023-0666, update to Wireshark version 4.0.6 or later.
You can find more information about CVE-2023-0666 at the following references: [1] https://gitlab.com/wireshark/wireshark/-/issues/19085 [2] https://security.gentoo.org/glsa/202309-02 [3] https://takeonme.org/cves/CVE-2023-0666.html