Gentoo update for Wireshark



Published: 2023-09-17
Risk High
Patch available YES
Number of vulnerabilities 15
CVE-ID CVE-2022-3725
CVE-2023-0666
CVE-2023-0667
CVE-2023-0668
CVE-2023-1161
CVE-2023-1992
CVE-2023-1993
CVE-2023-1994
CVE-2023-2854
CVE-2023-2855
CVE-2023-2856
CVE-2023-2857
CVE-2023-2858
CVE-2023-2879
CVE-2023-2952
CWE-ID CWE-20
CWE-787
CWE-400
CWE-835
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Gentoo Linux
Operating systems & Components / Operating system

net-analyzer/wireshark
Operating systems & Components / Operating system package or component

Vendor Gentoo

Security Bulletin

This security bulletin contains information about 15 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU68777

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-3725

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in OPUS dissector. A remote attacker can send specially crafted traffic to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Input validation error

EUVDB-ID: #VU76496

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-0666

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the RTPS dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Out-of-bounds write

EUVDB-ID: #VU78549

Risk: High

CVSSv3.1:

CVE-ID: CVE-2023-0667

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing MSMMS packets. A remote attacker can send specially crafted packets via the network trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Input validation error

EUVDB-ID: #VU76497

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-0668

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the IEEE C37.118 Synchrophasor dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Input validation error

EUVDB-ID: #VU72732

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-1161

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within ISO 15765 and ISO 10681 dissectors. A remote attacker can pass specially crafted traffic to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Input validation error

EUVDB-ID: #VU75053

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-1992

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in RPC over RDMA dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

7) Resource exhaustion

EUVDB-ID: #VU75052

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-1993

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources in LISP dissector. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

8) Input validation error

EUVDB-ID: #VU75051

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-1994

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in GQUIC dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

9) Input validation error

EUVDB-ID: #VU76495

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-2854

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in BLF file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

10) Input validation error

EUVDB-ID: #VU76490

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-2855

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Candump log file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

11) Input validation error

EUVDB-ID: #VU76494

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-2856

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in VMS TCPIPtrace file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

12) Input validation error

EUVDB-ID: #VU76491

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-2857

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in BLF file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

13) Input validation error

EUVDB-ID: #VU76493

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-2858

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in NetScaler file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

14) Infinite loop

EUVDB-ID: #VU76492

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-2879

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the GDSDB dissector. A remote attacker can pass specially crafted input to the application, consume all available system resources and cause denial of service conditions.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

15) Infinite loop

EUVDB-ID: #VU76498

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-2952

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the XRA dissector. A remote attacker can pass specially crafted input to the application, consume all available system resources and cause denial of service conditions.

Mitigation

Update the affected packages.
net-analyzer/wireshark to version: 4.0.6

Vulnerable software versions

Gentoo Linux: All versions

net-analyzer/wireshark: before 4.0.6

Fixed software versions

CPE2.3 External links

http://security.gentoo.org/glsa/202309-02


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###