First published: Tue Mar 26 2024(Updated: )
NetScreen file parser crash
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wireshark | <=2.6.20-0+deb10u4<=2.6.20-0+deb10u7<=3.4.10-0+deb11u1 | 4.0.11-1~deb12u1 4.2.0-1 |
Wireshark | >=3.6.0<=3.6.18 | |
Wireshark | >=4.0.0<=4.0.10 |
Upgrade to versions 4.0.11, 3.6.19 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6175 has been classified as a denial of service vulnerability in Wireshark.
To fix CVE-2023-6175, upgrade to Wireshark versions 4.0.11 or later and 4.2.0 or later.
Wireshark versions from 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 are affected by CVE-2023-6175.
CVE-2023-6175 enables a denial of service attack via a crafted capture file.
CVE-2023-6175 is not a remote vulnerability but allows for a denial of service through a malign capture file.