Wireshark <=4.0.5 Packet parsing heap buffer overflow
CVE-2023-0667 Published on June 7, 2023
Wireshark MSMMS parsing buffer overflow
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
Vulnerability Analysis
CVE-2023-0667 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. Public availability of a proof of concept (POC) exploit exists for CVE-2023-0667. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Products Associated with CVE-2023-0667
Want to know whenever a new CVE is published for Wireshark? stack.watch will email you.
Affected Versions
Wireshark Foundation Wireshark:- Before and including 4.0.5 is affected.
- Version 4.0.6 is unaffected.
- Before and including 3.6.13 is affected.
- Version 3.6.14 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.