CVE-2023-2856 – wireshark: VMS TCPIPtrace file parser crash
https://notcve.org/view.php?id=CVE-2023-2856
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file El fallo del analizador de archivos VMS TCPIPtrace en Wireshark 4.0.0 a 4.0.5 y 3.6.0 a 3.6.13 permite la denegación de servicio a través de un archivo de captura manipulado. A flaw was found in the VMS TCPIPtrace file parser of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing a buffer overflow, resulting in a denial of service. • https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json https://gitlab.com/wireshark/wireshark/-/issues/19083 https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html https://security.gentoo.org/glsa/202309-02 https://www.debian.org/security/2023/dsa-5429 https://www.wireshark.org/security/wnpa-sec-2023-16.html https://access.redhat.com/security/cve/CVE-2023-2856 https://bugzilla.redhat.com/show_bug.cgi?id=2210824 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-0668 – Wireshark IEEE-C37.118 parsing buffer overflow
https://notcve.org/view.php?id=CVE-2023-0668
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. Debido a un fallo en la validación de la longitud proporcionada por un atacante de paquetes IEEE-C37.118, Wireshark v4.0.5 y anteriores, por defecto, es susceptible a un desbordamiento de búfer de la pila, y posiblemente la ejecución de código en el contexto del proceso que ejecuta Wireshark. A flaw was found in the IEEE C37.118 Synchrophasor dissector of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing a buffer overflow, resulting in a denial of service. • https://gitlab.com/wireshark/wireshark/-/issues/19087 https://security.gentoo.org/glsa/202309-02 https://takeonme.org/cves/CVE-2023-0668.html https://www.debian.org/security/2023/dsa-5429 https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html https://www.wireshark.org/security/wnpa-sec-2023-19.html https://access.redhat.com/security/cve/CVE-2023-0668 https://bugzilla.redhat.com/show_bug.cgi?id=2210835 • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •
CVE-2023-0950 – Array Index UnderFlow in Calc Formula Parsing
https://notcve.org/view.php?id=CVE-2023-0950
Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1. A vulnerability was found in LibreOffice. Improper validation of the array index in the spreadsheet component of The Document Foundation in LibreOffice allows an attacker to craft a spreadsheet document that causes an array index underflow when loaded. • https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html https://security.gentoo.org/glsa/202311-15 https://www.debian.org/security/2023/dsa-5415 https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950 https://access.redhat.com/security/cve/CVE-2023-0950 https://bugzilla.redhat.com/show_bug.cgi?id=2210186 • CWE-129: Improper Validation of Array Index •
CVE-2023-2255 – Remote documents loaded without prompt via IFrame
https://notcve.org/view.php?id=CVE-2023-2255
Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3. A vulnerability was found in LibreOffice. • https://github.com/elweth-sec/CVE-2023-2255 https://github.com/SaintMichae64/CVE-2023-2255 https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html https://security.gentoo.org/glsa/202311-15 https://www.debian.org/security/2023/dsa-5415 https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255 https://access.redhat.com/security/cve/CVE-2023-2255 https://bugzilla.redhat.com/show_bug.cgi?id=2210185 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2023-1667 – libssh: NULL pointer dereference during rekeying with algorithm guessing
https://notcve.org/view.php?id=CVE-2023-1667
A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service. • http://www.libssh.org/security/advisories/CVE-2023-1667.txt https://access.redhat.com/security/cve/CVE-2023-1667 https://bugzilla.redhat.com/show_bug.cgi?id=2182199 https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN https://security.gentoo.org/glsa/202312-05 • CWE-476: NULL Pointer Dereference •