Vulnerability Description
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
CVSS Score
5.3
MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wireshark | Wireshark | >= 3.6.0, < 3.6.14 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.jsonThird Party Advisory
- https://gitlab.com/wireshark/wireshark/-/issues/19083ExploitIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2023/06/msg00004.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202309-02Third Party Advisory
- https://www.debian.org/security/2023/dsa-5429Third Party Advisory
- https://www.wireshark.org/security/wnpa-sec-2023-16.htmlVendor Advisory
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.jsonThird Party Advisory
- https://gitlab.com/wireshark/wireshark/-/issues/19083ExploitIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2023/06/msg00004.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html
- https://security.gentoo.org/glsa/202309-02Third Party Advisory
- https://www.debian.org/security/2023/dsa-5429Third Party Advisory
- https://www.wireshark.org/security/wnpa-sec-2023-16.htmlVendor Advisory
FAQ
What is CVE-2023-2856?
CVE-2023-2856 is a vulnerability with a CVSS score of 5.3 (MEDIUM). VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
How severe is CVE-2023-2856?
CVE-2023-2856 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2856?
Check the references section above for vendor advisories and patch information. Affected products include: Wireshark Wireshark, Debian Debian Linux.