Lucene search

K
rosalinuxROSA LABROSA-SA-2024-2388
HistoryApr 02, 2024 - 7:22 a.m.

Advisory ROSA-SA-2024-2388

2024-04-0207:22:04
ROSA LAB
abf.rosalinux.ru
11
wireshark
rosa-chrome
vulnerabilities
heap buffer overflow
code execution
denial of service
packet analyzers
dissectors

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.2 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

54.4%

Software: wireshark 4.0.10
OS: ROSA-CHROME

package_evr_string: wireshark-4.0.10-1.src.rpm

CVE-ID: CVE-2023-0666
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: Due to a failure in length validation provided by an attacker-created RTPS packet, Wireshark is vulnerable by default to a heap buffer overflow and possibly code execution in the context of the process running Wireshark.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

CVE-ID: CVE-2023-0667
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: Due to a failure in length validation provided by an attacker-created MSMMS packet, Wireshark in an unusual configuration is prone to a heap buffer overflow and possibly code execution in the context of a running process
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

CVE-ID: CVE-2023-0668
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: Due to a failure in the length check provided by the IEEE-C37.118 package created by an attacker, Wireshark version 4.0.5 and earlier is by default prone to a heap buffer overflow and possibly code execution in the context of the Wireshark startup process.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

CVE-ID: CVE-2023-1161
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: Failure of ISO 15765 and ISO 10681 dissector in Wireshark allows denial of service via packet injection or created capture file.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

CVE-ID: CVE-2023-1992
BDU-ID: 2023-03347
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the RPCoRDMA dissector of the computer network traffic analyzer Wireshark is associated with uncontrolled resource consumption. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service via packet injection or a crafted capture file
CVE-STATUS: Resolved
CVE-REV: To close, run command: sudo dnf update wireshark

CVE-ID: CVE-2023-1993
BDU-ID: 2023-03609
CVE-Crit: MEDIUM
CVE-DESC.: A vulnerability in the LISP dissector of the computer network traffic analyzer Wireshark is associated with uncontrolled resource consumption. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service by injecting a packet or a crafted capture file
CVE-STATUS: Resolved
CVE-REV: To close, run command: sudo dnf update wireshark

CVE-ID: CVE-2023-1994
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: A GQUIC dissector failure in Wireshark allows a denial of service via packet injection or a created capture file.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

CVE-ID: CVE-2023-2854
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: BLF file analyzer failure in Wireshark allows a denial of service via a created capture file.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

CVE-ID: CVE-2023-2855
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: Candump log analyzer failure in Wireshark allows a denial of service via a created capture file.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

CVE-ID: CVE-2023-2856
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: VMS TCPIPtrace file analyzer failure in Wireshark allows a denial of service via a created capture file.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

CVE-ID: CVE-2023-2857
BDU-ID: None
CVE-Crit: MEDIUM
CVE-DESC.: BLF file analyzer failure in Wireshark allows a denial of service via a created capture file.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update wireshark

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchwireshark< 4.0.10UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.2 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

54.4%