First published: Fri May 26 2023(Updated: )
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=3.6.0<3.6.14 | |
Wireshark Wireshark | >=4.0.0<4.0.6 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =12.0 | |
debian/wireshark | <=2.6.20-0+deb10u4<=3.4.10-0+deb11u1 | 2.6.20-0+deb10u7 4.0.6-1~deb12u1 4.0.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Wireshark vulnerability is CVE-2023-2856.
The severity of CVE-2023-2856 is medium (CVSS score: 6.5).
This vulnerability affects Wireshark versions 3.6.0 to 3.6.13 and 4.0.0 to 4.0.5.
An attacker can exploit this vulnerability by crafting a malicious capture file, which can lead to a denial of service.
Yes, a fix is available. It is recommended to upgrade to the patched versions: 3.6.14 or later for Wireshark 3.6.x, and 4.0.6 or later for Wireshark 4.0.x.