Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
The product reads data past the end, or before the beginning, of the intended buffer.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://takeonme.org/cves/CVE-2023-0668.html | third party advisory exploit |
https://gitlab.com/wireshark/wireshark/-/issues/19087 | issue tracking exploit |
https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html | release notes |
https://www.wireshark.org/security/wnpa-sec-2023-19.html | vendor advisory |
https://www.debian.org/security/2023/dsa-5429 | third party advisory |
https://security.gentoo.org/glsa/202309-02 | third party advisory |