Bug 2229692 (CVE-2023-0667) - CVE-2023-0667 wireshark: incorrect length validation may lead to a heap-based buffer overflow
Summary: CVE-2023-0667 wireshark: incorrect length validation may lead to a heap-based...
Keywords:
Status: NEW
Alias: CVE-2023-0667
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2229705 2229706 2229707
Blocks: 2229693
TreeView+ depends on / blocked
 
Reported: 2023-08-07 10:39 UTC by Marian Rehak
Modified: 2023-09-22 21:29 UTC (History)
1 user (show)

Fixed In Version: wireshark 4.0.6
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Wireshark package. Due to failure in validating the length provided by an attacker-crafted MS-MMS packet, Wireshark, in an unusual configuration, is susceptible to a heap-based buffer overflow. This issue may result in a crash.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2023-08-07 10:39:56 UTC
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

Reference:

https://gitlab.com/wireshark/wireshark/-/issues/19086
https://takeonme.org/cves/CVE-2023-0667.html


Note You need to log in before you can comment on or make changes to this bug.