CVE-2023-0666
CVSS V2 None
CVSS V3 None
Description
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Overview
- CVE ID
- CVE-2023-0666
- Assigner
- AHA
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-06-07T02:25:27.974Z
- Last Modified Date
- 2023-06-07T02:42:41.249Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://takeonme.org/cves/CVE-2023-0666.html | third-party-advisory |
https://gitlab.com/wireshark/wireshark/-/issues/19085 | issue-tracking |
https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html | release-notes |
https://www.wireshark.org/security/wnpa-sec-2023-18.html | vendor-advisory |
https://www.debian.org/security/2023/dsa-5429 | |
https://security.gentoo.org/glsa/202309-02 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0666 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 14:38:17 | Added to TrackCVE |