Risk | High |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2023-0667 CVE-2023-0668 CVE-2023-2855 CVE-2023-2856 CVE-2023-2857 CVE-2023-2858 CVE-2023-2879 CVE-2023-2952 CVE-2023-3648 |
CWE-ID | CWE-787 CWE-20 CWE-835 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Desktop Applications Module Operating systems & Components / Operating system Basesystem Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system libwireshark15-debuginfo Operating systems & Components / Operating system package or component libwireshark15 Operating systems & Components / Operating system package or component wireshark-debugsource Operating systems & Components / Operating system package or component wireshark-debuginfo Operating systems & Components / Operating system package or component libwsutil13 Operating systems & Components / Operating system package or component wireshark-devel Operating systems & Components / Operating system package or component wireshark Operating systems & Components / Operating system package or component libwsutil13-debuginfo Operating systems & Components / Operating system package or component libwiretap12 Operating systems & Components / Operating system package or component wireshark-ui-qt Operating systems & Components / Operating system package or component libwiretap12-debuginfo Operating systems & Components / Operating system package or component wireshark-ui-qt-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU78549
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-0667
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing MSMMS packets. A remote attacker can send specially crafted packets via the network trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76497
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-0668
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the IEEE C37.118 Synchrophasor dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76490
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2855
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Candump log file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76494
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2856
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in VMS TCPIPtrace file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76491
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2857
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in BLF file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76493
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2858
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in NetScaler file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76492
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2879
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the GDSDB dissector. A remote attacker can pass specially crafted input to the application, consume all available system resources and cause denial of service conditions.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76498
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-2952
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the XRA dissector. A remote attacker can pass specially crafted input to the application, consume all available system resources and cause denial of service conditions.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79311
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-3648
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Kafka dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package wireshark to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP4 - 15-SP5
Basesystem Module: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP3 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.2 - 4.3
SUSE Manager Server: 4.2 - 4.3
SUSE Manager Proxy: 4.2 - 4.3
libwireshark15-debuginfo: before 3.6.15-150000.3.97.1
libwireshark15: before 3.6.15-150000.3.97.1
wireshark-debugsource: before 3.6.15-150000.3.97.1
wireshark-debuginfo: before 3.6.15-150000.3.97.1
libwsutil13: before 3.6.15-150000.3.97.1
wireshark-devel: before 3.6.15-150000.3.97.1
wireshark: before 3.6.15-150000.3.97.1
libwsutil13-debuginfo: before 3.6.15-150000.3.97.1
libwiretap12: before 3.6.15-150000.3.97.1
wireshark-ui-qt: before 3.6.15-150000.3.97.1
libwiretap12-debuginfo: before 3.6.15-150000.3.97.1
wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.