QID 355179

Date Published: 2023-05-29

QID 355179: Amazon Linux Security Advisory for wireshark : ALAS2023-2023-120

Memory exhaustion in the kafka protocol dissector in wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file (cve-2022-4344) infinite loops in the bpv6, openflow, and kafka protocol dissectors in wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file (cve-2022-4345) excessive loops in multiple dissectors in wireshark 4.0.0 to 4.0.2 and ... note: https://www.wireshark.org/security/wnpa-sec-2023-06.html note: https://gitlab.com/wireshark/wireshark/-/issues/18711 note: https://gitlab.com/wireshark/wireshark/-/issues/18720 note: https://gitlab.com/wireshark/wireshark/-/issues/18737 (cve-2023-0411) tipc dissector crash in wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file (cve-2023-0412) dissection engine bug in wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 ... note: https://www.wireshark.org/security/wnpa-sec-2023-03.html note: https://gitlab.com/wireshark/wireshark/-/issues/18766 (cve-2023-0413) crash in the eap dissector in wireshark 4.0.0 to 4.0.2 allows denial of service via packet injection or crafted capture file (cve-2023-0414) iscsi dissector crash in wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file (cve-2023-0415) gnw dissector crash in wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file (cve-2023-0416) memory leak in the nfs dissector in wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file (cve-2023-0417)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.1 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-120 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-120 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-120.html