Lucene search

K
vulnrichmentGitLabVULNRICHMENT:CVE-2023-6175
HistoryMar 26, 2024 - 7:30 a.m.

CVE-2023-6175 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark

2024-03-2607:30:49
CWE-120
GitLab
github.com
6
cve-2023-6175
wireshark
netscreen file parser
buffer overflow
denial of service
crafted capture file

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
    ],
    "vendor": "wireshark",
    "product": "wireshark",
    "versions": [
      {
        "status": "affected",
        "version": "4.0.0",
        "lessThan": "4.0.11",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "3.6.0",
        "lessThan": "3.6.19",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total