CVE-2023-0667

Source
https://cve.org/CVERecord?id=CVE-2023-0667
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0667.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-0667
Downstream
Related
Published
2023-06-07T03:15:09.117Z
Modified
2026-02-12T07:43:56.006303Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark

References

Affected packages

Git / github.com/wireshark/wireshark

Affected ranges

Type
GIT
Repo
https://github.com/wireshark/wireshark
Events

Affected versions

v4.*
v4.0.0
v4.0.1
v4.0.10
v4.0.10rc0
v4.0.11
v4.0.11rc0
v4.0.12
v4.0.12rc0
v4.0.13
v4.0.13rc0
v4.0.14
v4.0.14rc0
v4.0.15
v4.0.15rc0
v4.0.16
v4.0.16rc0
v4.0.17
v4.0.17rc0
v4.0.18rc0
v4.0.1rc0
v4.0.2
v4.0.2rc0
v4.0.3
v4.0.3rc0
v4.0.4
v4.0.4rc0
v4.0.5
v4.0.5rc0
v4.0.6
v4.0.6rc0
v4.0.7
v4.0.7rc0
v4.0.8
v4.0.8rc0
v4.0.9
v4.0.9rc0
wireshark-4.*
wireshark-4.0.0
wireshark-4.0.1
wireshark-4.0.10
wireshark-4.0.11
wireshark-4.0.12
wireshark-4.0.13
wireshark-4.0.14
wireshark-4.0.15
wireshark-4.0.16
wireshark-4.0.17
wireshark-4.0.2
wireshark-4.0.3
wireshark-4.0.4
wireshark-4.0.5
wireshark-4.0.6
wireshark-4.0.7
wireshark-4.0.8
wireshark-4.0.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0667.json"