CVE-2023-0411
Published: 26 January 2023
Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
Priority
Status
Package | Release | Status |
---|---|---|
wireshark Launchpad, Ubuntu, Debian |
kinetic |
Ignored
(end of life, was needs-triage)
|
bionic |
Needs triage
|
|
focal |
Needs triage
|
|
jammy |
Needs triage
|
|
trusty |
Needs triage
|
|
upstream |
Released
(4.0.3-1)
|
|
xenial |
Needs triage
|
|
mantic |
Not vulnerable
(4.0.3-1)
|
|
lunar |
Ignored
(end of life, was needs-triage)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411
- https://www.wireshark.org/security/wnpa-sec-2023-06.html
- https://gitlab.com/wireshark/wireshark/-/issues/18711
- https://gitlab.com/wireshark/wireshark/-/issues/18720
- https://gitlab.com/wireshark/wireshark/-/issues/18737
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
- NVD
- Launchpad
- Debian