Back to bug 2229692
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2023-08-07 10:43:03 UTC | Blocks | 2229693 | |
| Marian Rehak | 2023-08-07 11:24:09 UTC | Depends On | 2229705, 2229706, 2229707 | |
| Marian Rehak | 2023-08-07 11:45:42 UTC | Doc Text | A flaw was found in the Wireshark package. Due to failure in validating the length provided by an attacker-crafted MS-MMS packet, Wireshark, in an unusual configuration, is susceptible to a heap-based buffer overflow. This may result in a crash. | |
| Marian Rehak | 2023-08-07 11:47:18 UTC | Summary | TRIAGE-CVE-2023-0667 wireshark: incorrect length validation may lead to a heap-based buffer overflow | CVE-2023-0667 wireshark: incorrect length validation may lead to a heap-based buffer overflow |
| Alias | TRIAGE-CVE-2023-0667 | CVE-2023-0667 | ||
| RaTasha Tillery-Smith | 2023-08-07 13:08:33 UTC | Doc Text | A flaw was found in the Wireshark package. Due to failure in validating the length provided by an attacker-crafted MS-MMS packet, Wireshark, in an unusual configuration, is susceptible to a heap-based buffer overflow. This may result in a crash. | A flaw was found in the Wireshark package. Due to failure in validating the length provided by an attacker-crafted MS-MMS packet, Wireshark, in an unusual configuration, is susceptible to a heap-based buffer overflow. This issue may result in a crash. |
Back to bug 2229692