NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file
References
Link | Resource |
---|---|
https://gitlab.com/wireshark/wireshark/-/issues/19404 | Issue Tracking |
https://www.wireshark.org/security/wnpa-sec-2023-29.html | Vendor Advisory |
https://gitlab.com/wireshark/wireshark/-/issues/19404 | Issue Tracking |
https://www.wireshark.org/security/wnpa-sec-2023-29.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Apr 2025, 18:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/wireshark/wireshark/-/issues/19404 - Issue Tracking | |
References | () https://www.wireshark.org/security/wnpa-sec-2023-29.html - Vendor Advisory | |
First Time |
Wireshark
Wireshark wireshark |
|
CPE | cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:* |
Information
Published : 2024-03-26 08:15
Updated : 2025-04-16 18:53
NVD link : CVE-2023-6175
Mitre link : CVE-2023-6175
CVE.ORG link : CVE-2023-6175
JSON object : View
Products Affected
wireshark
- wireshark
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')