Lucene search

K
cvelistAHACVELIST:CVE-2023-0666
HistoryJun 07, 2023 - 2:25 a.m.

CVE-2023-0666 Wireshark RTPS Parsing Buffer Overflow

2023-06-0702:25:27
CWE-122
AHA
www.cve.org
wireshark
rtps
buffer overflow
vulnerability
code execution
cve-2023-0666

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.5%

Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Wireshark",
    "vendor": "Wireshark Foundation",
    "versions": [
      {
        "lessThanOrEqual": "4.0.5",
        "status": "affected",
        "version": "4.0.0",
        "versionType": "semver"
      },
      {
        "status": "unaffected",
        "version": "4.0.6"
      }
    ]
  }
]