First published: Thu Mar 28 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Wireshark. User interaction is required to exploit this vulnerability in that the target must open a specially crafted packet capture file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-6175.
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-355 is rated at 7.8, indicating a high risk for exploitation.
To fix ZDI-24-355, ensure that you update Wireshark to the latest version that addresses this vulnerability.
ZDI-24-355 allows remote attackers to execute arbitrary code by tricking users into opening a specially crafted packet capture file.
Yes, user interaction is required as the target must open the specially crafted packet capture file for exploitation.
ZDI-24-355 affects installations of Wireshark.