CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
75.5%
Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
[
{
"vendor": "Wireshark Foundation",
"product": "Wireshark",
"versions": [
{
"version": ">=3.6.0, <3.6.2",
"status": "affected"
},
{
"version": ">=3.4.0, <3.4.12",
"status": "affected"
}
]
}
]
gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0583.json
gitlab.com/wireshark/wireshark/-/issues/17840
lists.debian.org/debian-lts-announce/2022/03/msg00041.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRJ24JRKLA6XMDKLGVTOPM5KBBU4UHLN/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3DZD2JU56ZI4XV2B3HGVGA5PXQDNA5T/
security.gentoo.org/glsa/202210-04
www.wireshark.org/security/wnpa-sec-2022-03.html
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
75.5%