QID 355402

Date Published: 2023-06-14

QID 355402: Amazon Linux Security Advisory for wireshark : ALAS2023-2023-197

due to failure in validating the length provided by an attacker-crafted rtps packet, wireshark version between 4.0.0 to 4.0.5, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running wireshark. note: https://www.wireshark.org/security/wnpa-sec-2023-18.html note: https://gitlab.com/wireshark/wireshark/-/issues/19085 (cve-2023-0666) due to failure in validating the length provided by an attacker-crafted ieee-c37.118 packet, wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running wireshark.
( CVE-2023-0668 appears to be an instance of cwe-125. note: https://www.wireshark.org/security/wnpa-sec-2023-19.html note: https://gitlab.com/wireshark/wireshark/-/issues/19087 (cve-2023-0668) a vulnerability exists in wireshark version 4.0.0 to 4.0.5 which would allow a remote attacker to crash wireshark by either injecting a malformed packet onto the wire or by convincing a user to read a malformed packet trace file. (
( CVE-2023-2854) candump log parser crash in wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file (cve-2023-2855) vms tcpiptrace file parser crash in wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file (cve-2023-2856) a vulnerability was found in wireshark versions between 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13.
The attacker would need the victim to open a maliciously crafted wireshark trace file, which would cause wireshark to crash. (

Note: The preceding description block is extracted directly from the security advisory.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-197 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-197 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-197.html