CVE-2023-6175Classic Buffer Overflow in Foundation Wireshark

Severity
7.8HIGHNVD
EPSS
0.0%
top 86.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 26

Description

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5wireshark_foundation/wireshark4.0.04.0.11+1
Debianwireshark/wireshark< 3.4.16-0+deb11u1+3
NVDwireshark/wireshark3.6.03.6.18+1

🔴Vulnerability Details

3
OSV
CVE-2023-6175: NetScreen file parser crash in Wireshark 42024-03-26
CVEList
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark2024-03-26
GHSA
GHSA-r8r7-4wvf-px33: NetScreen file parser crash in Wireshark 42024-03-26

📋Vendor Advisories

3
Microsoft
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark2024-03-12
Red Hat
wireshark: NetScreen File Parsing Heap-based Buffer Overflow2023-11-15
Debian
CVE-2023-6175: wireshark - NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 all...2023
CVE-2023-6175 — Classic Buffer Overflow | cvebase