CVE-2023-0666
Summary
| CVE | CVE-2023-0666 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-06-07 03:15:00 UTC |
| Updated | 2023-10-20 20:53:00 UTC |
| Description | Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| RTPS parsing buffer overflow (#19085) · Issues · Wireshark Foundation / wireshark · GitLab |
MISC |
gitlab.com |
|
| Wireshark • Wireshark 4.0.6 Release Notes |
MISC |
www.wireshark.org |
|
| Wireshark: Multiple Vulnerabilities (GLSA 202309-02) — Gentoo security |
MISC |
security.gentoo.org |
|
| Wireshark • wnpa-sec-2023-18 RTPS dissector crash |
MISC |
www.wireshark.org |
|
| Debian -- Security Information -- DSA-5429-1 wireshark |
MISC |
www.debian.org |
|
| CVE-2023-0666 ???? • Austin Hackers Academy |
MISC |
takeonme.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161124 Oracle Enterprise Linux Security Update for wireshark (ELSA-2023-6469)
- 161162 Oracle Enterprise Linux Security Update for wireshark (ELSA-2023-7015)
- 181872 Debian Security Update for wireshark (DSA 5429-1)
- 242380 Red Hat Update for wireshark (RHSA-2023:6469)
- 242421 Red Hat Update for wireshark (RHSA-2023:7015)
- 355402 Amazon Linux Security Advisory for wireshark : ALAS2023-2023-197
- 378524 Wireshark RTPS dissector crash Vulnerability (wnpa-sec-2023-18)
- 710745 Gentoo Linux Wireshark Multiple Vulnerabilities (GLSA 202309-02)
- 941355 AlmaLinux Security Update for wireshark (ALSA-2023:6469)
- 941425 AlmaLinux Security Update for wireshark (ALSA-2023:7015)