NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file
Solution:
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.wireshark.org/security/wnpa-sec-2023-29.html | vendor advisory |
https://gitlab.com/wireshark/wireshark/-/issues/19404 | issue tracking |