CVE-2023-0667Heap-based Buffer Overflow in Wireshark

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 54.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 7
Latest updateJun 13

Description

Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDwireshark/wireshark4.0.04.0.6
Debianwireshark/wireshark< 3.4.16-0+deb11u1+3

🔴Vulnerability Details

3
CVEList
Wireshark MSMMS parsing buffer overflow2023-06-07
OSV
CVE-2023-0667: Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 42023-06-07
GHSA
GHSA-m7h5-4hfx-r2mh: Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 42023-06-07

📋Vendor Advisories

3
Microsoft
Wireshark MSMMS parsing buffer overflow2023-06-13
Red Hat
wireshark: incorrect length validation may lead to a heap-based buffer overflow2023-06-07
Debian
CVE-2023-0667: wireshark - Due to failure in validating the length provided by an attacker-crafted MSMMS pa...2023
CVE-2023-0667 — Heap-based Buffer Overflow in Wireshark | cvebase