First published: Fri May 26 2023(Updated: )
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=3.6.0<3.6.14 | |
Wireshark Wireshark | >=4.0.0<4.0.6 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =12.0 | |
debian/wireshark | <=2.6.20-0+deb10u4<=3.4.10-0+deb11u1 | 2.6.20-0+deb10u7 4.0.6-1~deb12u1 4.0.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Wireshark issue is CVE-2023-2879.
The severity of CVE-2023-2879 is high (7 out of 10).
CVE-2023-2879 allows denial of service through packet injection or crafted capture file in Wireshark versions 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13.
To fix CVE-2023-2879 in Wireshark, update to versions 3.6.14 or later for 3.x branch, and versions 4.0.6 or later for 4.x branch.
You can find more information about CVE-2023-2879 at the following references: 1. [Issue on GitLab](https://gitlab.com/wireshark/wireshark/-/issues/19068) 2. [CVE JSON](https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json) 3. [Wireshark Security Advisory](https://www.wireshark.org/security/wnpa-sec-2023-14.html)