CVE-2023-0666Heap-based Buffer Overflow in Wireshark

Severity
6.5MEDIUMNVD
EPSS
1.9%
top 16.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 7

Description

Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDwireshark/wireshark4.0.04.0.6
Debianwireshark/wireshark< 3.4.16-0+deb11u1+3
CVEListV5wireshark_foundation/wireshark4.0.04.0.5

Also affects: Debian Linux 12.0

🔴Vulnerability Details

3
OSV
CVE-2023-0666: Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 42023-06-07
CVEList
Wireshark RTPS Parsing Buffer Overflow2023-06-07
GHSA
GHSA-p3q5-qxhp-fpcg: Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 42023-06-07

📋Vendor Advisories

2
Red Hat
wireshark: RTPS dissector crash2023-05-18
Debian
CVE-2023-0666: wireshark - Due to failure in validating the length provided by an attacker-crafted RTPS pac...2023
CVE-2023-0666 — Heap-based Buffer Overflow in Wireshark | cvebase