CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
16.2%
Issue Overview:
A heap based buffer overflow in Wireshark’s NetScreen file parser may lead to a local arbitrary code execution via a crafted capture file. (CVE-2023-6175)
Affected Packages:
wireshark
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update wireshark to update your system.
New Packages:
aarch64:
wireshark-2.6.2-15.amzn2.0.6.aarch64
wireshark-cli-2.6.2-15.amzn2.0.6.aarch64
wireshark-devel-2.6.2-15.amzn2.0.6.aarch64
wireshark-debuginfo-2.6.2-15.amzn2.0.6.aarch64
i686:
wireshark-2.6.2-15.amzn2.0.6.i686
wireshark-cli-2.6.2-15.amzn2.0.6.i686
wireshark-devel-2.6.2-15.amzn2.0.6.i686
wireshark-debuginfo-2.6.2-15.amzn2.0.6.i686
src:
wireshark-2.6.2-15.amzn2.0.6.src
x86_64:
wireshark-2.6.2-15.amzn2.0.6.x86_64
wireshark-cli-2.6.2-15.amzn2.0.6.x86_64
wireshark-devel-2.6.2-15.amzn2.0.6.x86_64
wireshark-debuginfo-2.6.2-15.amzn2.0.6.x86_64
Red Hat: CVE-2023-6175
Mitre: CVE-2023-6175
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | wireshark | < 2.6.2-15.amzn2.0.6 | wireshark-2.6.2-15.amzn2.0.6.aarch64.rpm |
Amazon Linux | 2 | aarch64 | wireshark-cli | < 2.6.2-15.amzn2.0.6 | wireshark-cli-2.6.2-15.amzn2.0.6.aarch64.rpm |
Amazon Linux | 2 | aarch64 | wireshark-devel | < 2.6.2-15.amzn2.0.6 | wireshark-devel-2.6.2-15.amzn2.0.6.aarch64.rpm |
Amazon Linux | 2 | aarch64 | wireshark-debuginfo | < 2.6.2-15.amzn2.0.6 | wireshark-debuginfo-2.6.2-15.amzn2.0.6.aarch64.rpm |
Amazon Linux | 2 | i686 | wireshark | < 2.6.2-15.amzn2.0.6 | wireshark-2.6.2-15.amzn2.0.6.i686.rpm |
Amazon Linux | 2 | i686 | wireshark-cli | < 2.6.2-15.amzn2.0.6 | wireshark-cli-2.6.2-15.amzn2.0.6.i686.rpm |
Amazon Linux | 2 | i686 | wireshark-devel | < 2.6.2-15.amzn2.0.6 | wireshark-devel-2.6.2-15.amzn2.0.6.i686.rpm |
Amazon Linux | 2 | i686 | wireshark-debuginfo | < 2.6.2-15.amzn2.0.6 | wireshark-debuginfo-2.6.2-15.amzn2.0.6.i686.rpm |
Amazon Linux | 2 | x86_64 | wireshark | < 2.6.2-15.amzn2.0.6 | wireshark-2.6.2-15.amzn2.0.6.x86_64.rpm |
Amazon Linux | 2 | x86_64 | wireshark-cli | < 2.6.2-15.amzn2.0.6 | wireshark-cli-2.6.2-15.amzn2.0.6.x86_64.rpm |
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
16.2%