Heap-based Buffer Overflow in Wireshark Version 4.0.5 and Prior

Heap-based Buffer Overflow in Wireshark Version 4.0.5 and Prior

CVE-2023-0666 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.

Learn more about our Web Application Penetration Testing UK.