First published: Wed Jun 07 2023(Updated: )
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Credit: cve@takeonme.org cve@takeonme.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | <=3.4.10-0+deb11u1 | 2.6.20-0+deb10u4 2.6.20-0+deb10u7 4.0.6-1~deb12u1 4.0.10-1 |
Wireshark Wireshark | >=3.6.0<3.6.14 | |
Wireshark Wireshark | >=4.0.0<4.0.6 | |
Debian Debian Linux | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0668 is a vulnerability in Wireshark version 4.0.5 and prior that allows for a heap-based buffer overflow and possibly code execution in the context of the process.
CVE-2023-0668 affects Wireshark versions 4.0.5 and prior by default.
CVE-2023-0668 has a severity rating of 6.5, which is considered medium.
To fix CVE-2023-0668, you should upgrade to Wireshark version 4.0.6 or later, or apply the appropriate patches provided by the software vendor.
You can find more information about CVE-2023-0668 in the references provided: [URL 1](https://gitlab.com/wireshark/wireshark/-/issues/19087), [URL 2](https://security.gentoo.org/glsa/202309-02), [URL 3](https://takeonme.org/cves/CVE-2023-0668.html).