Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-0666


Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.


Published

2023-06-07T03:15:09.000

Last Modified

2025-01-07T16:15:28.873

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-122
  • Type: Primary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application wireshark wireshark < 4.0.6 Yes
Operating System debian debian_linux 12.0 Yes

References