First published: Thu Nov 16 2023(Updated: )
SSH dissector crash in Wireshark 4.0.0 to 4.0.10 allows denial of service via packet injection or crafted capture file
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | <=2.6.20-0+deb10u4<=2.6.20-0+deb10u7 | 3.4.10-0+deb11u1 4.0.11-1~deb12u1 4.2.0-1 |
Wireshark Wireshark | >=4.0.0<=4.0.10 | |
Debian Debian Linux | =12.0 |
Upgrade to version 4.0.11 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Wireshark vulnerability is CVE-2023-6174.
The title of this Wireshark vulnerability is 'Out-of-bounds Read in Wireshark'.
The description of this Wireshark vulnerability is 'SSH dissector crash in Wireshark 4.0.0 to 4.0.10 allows denial of service via packet injection or crafted capture file'.
The severity of CVE-2023-6174 is medium with a severity value of 6.3.
Wireshark versions 2.6.20-0+deb10u4 to 2.6.20-0+deb10u7, 4.0.6-1~deb12u1, and 4.0.10-1 are affected by this vulnerability.
To fix CVE-2023-6174 in Wireshark, update to version 3.4.10-0+deb11u1, 4.0.11-1~deb12u1, or 4.0.11-1 depending on your Debian distribution.
The Common Vulnerabilities and Exposures (CVE) reference for this Wireshark vulnerability is CVE-2023-6174.
The CWE reference for this Wireshark vulnerability is CWE-125.