First published: Wed Jun 07 2023(Updated: )
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
Credit: cve@takeonme.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark | >=4.0.0<4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Wireshark vulnerability is CVE-2023-0667.
The severity of CVE-2023-0667 is medium.
Wireshark version 4.0.5 and prior are affected.
CVE-2023-0667 can lead to a heap-based buffer overflow and possibly code execution in the context of the process running Wireshark.
You can find more information about CVE-2023-0667 at the following references: [GitLab](https://gitlab.com/wireshark/wireshark/-/issues/19086), [Gentoo Security](https://security.gentoo.org/glsa/202309-02), [Takeonme](https://takeonme.org/cves/CVE-2023-0667.html).