Lucene search

K
cvelistGitLabCVELIST:CVE-2023-6175
HistoryMar 26, 2024 - 7:30 a.m.

CVE-2023-6175 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark

2024-03-2607:30:49
CWE-120
GitLab
www.cve.org
2
cve-2023-6175
buffer copy without checking size
wireshark
netscreen file parser
denial of service

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.2%

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

CNA Affected

[
  {
    "vendor": "Wireshark Foundation",
    "product": "Wireshark",
    "versions": [
      {
        "version": "4.0.0",
        "status": "affected",
        "lessThan": "4.0.11",
        "versionType": "semver"
      },
      {
        "version": "3.6.0",
        "status": "affected",
        "lessThan": "3.6.19",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.2%