NA

CVE-2023-6175

Published: 26/03/2024 Updated: 26/03/2024

Vulnerability Summary

This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Wireshark. User interaction is required to exploit this vulnerability in that the target must open a specially crafted packet capture file. The specific flaw exists within the parsing of packet capture files in the NetScreen format. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

Vendor Advisories

A vulnerability was discovered in the SSH dissector of Wireshark, a network protocol analyzer, which could result in denial of service or potentially the execution of arbitrary code For the stable distribution (bookworm), these problems have been fixed in version 4011-1~deb12u1 We recommend that you upgrade your wireshark packages For the deta ...
A heap based buffer overflow in Wireshark's NetScreen file parser may lead to a local arbitrary code execution via a crafted capture file (CVE-2023-6175) ...
Description<!---->A heap-based buffer overflow was found in Wireshark's NetScreen file parser This issue may allow local arbitrary code execution via a crafted capture fileA heap-based buffer overflow was found in Wireshark's NetScreen file parser This issue may allow local arbitrary code execution via a crafted capture file ...