CVE-2023-6175
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file
La falla del analizador de archivos NetScreen en Wireshark 4.0.0 a 4.0.10 y 3.6.0 a 3.6.18 permite la denegación de servicio a través de un archivo de captura manipulado.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Wireshark. User interaction is required to exploit this vulnerability in that the target must open a specially crafted packet capture file.
The specific flaw exists within the parsing of packet capture files in the NetScreen format. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-11-16 CVE Reserved
- 2023-11-20 CVE Published
- 2024-03-30 EPSS Updated
- 2024-08-29 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://gitlab.com/wireshark/wireshark/-/issues/19404 | Issue Tracking | |
https://www.wireshark.org/security/wnpa-sec-2023-29.html |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wireshark Foundation Search vendor "Wireshark Foundation" | Wireshark Search vendor "Wireshark Foundation" for product "Wireshark" | >= 4.0.0 < 4.0.11 Search vendor "Wireshark Foundation" for product "Wireshark" and version " >= 4.0.0 < 4.0.11" | en |
Affected
| ||||||
Wireshark Foundation Search vendor "Wireshark Foundation" | Wireshark Search vendor "Wireshark Foundation" for product "Wireshark" | >= 3.6.0 < 3.6.19 Search vendor "Wireshark Foundation" for product "Wireshark" and version " >= 3.6.0 < 3.6.19" | en |
Affected
|