CVE-2023-0667

Source
https://cve.org/CVERecord?id=CVE-2023-0667
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0667.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-0667
Downstream
Related
Published
2023-06-07T02:38:07.798Z
Modified
2026-05-15T11:53:51.797099605Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Wireshark MSMMS parsing buffer overflow
Details

Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

Database specific
{
    "cwe_ids": [
        "CWE-122"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0667.json",
    "cna_assigner": "AHA"
}
References

Affected packages