Bugzilla – Bug 1211707
VUL-0: CVE-2023-2856: wireshark: VMS TCPIPtrace file parser crash
Last modified: 2023-08-09 08:59:22 UTC
CVE-2023-2856 Summary Name: VMS TCPIPtrace file parser crash Docid: wnpa-sec-2023-16 Date: May 24, 2023 Affected versions: 4.0.0 to 4.0.5, 3.6.0 to 3.6.13 Fixed versions: 4.0.6, 3.6.14 References: Wireshark issue 19083. CVE-2023-2856. Details Description The VMS TCPIPtrace file parser could crash. Discovered by Huascar Tejeda. Impact It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Resolution Upgrade to Wireshark 4.0.6, 3.6.14 or later. References: https://gitlab.com/wireshark/wireshark/-/issues/19083 https://www.wireshark.org/security/wnpa-sec-2023-16
SUSE-SU-2023:2320-1: An update that solves six vulnerabilities can now be installed. Category: security (moderate) Bug References: 1211703, 1211705, 1211706, 1211707, 1211710, 1211793 CVE References: CVE-2023-0668, CVE-2023-2855, CVE-2023-2856, CVE-2023-2857, CVE-2023-2858, CVE-2023-2859 Sources used: openSUSE Leap 15.4 (src): wireshark-3.6.14-150000.3.92.1 openSUSE Leap 15.5 (src): wireshark-3.6.14-150000.3.92.1 Basesystem Module 15-SP4 (src): wireshark-3.6.14-150000.3.92.1 Basesystem Module 15-SP5 (src): wireshark-3.6.14-150000.3.92.1 Desktop Applications Module 15-SP4 (src): wireshark-3.6.14-150000.3.92.1 Desktop Applications Module 15-SP5 (src): wireshark-3.6.14-150000.3.92.1 SUSE Linux Enterprise Real Time 15 SP3 (src): wireshark-3.6.14-150000.3.92.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done
SUSE-SU-2023:3252-1: An update that solves nine vulnerabilities can now be installed. Category: security (moderate) Bug References: 1211703, 1211705, 1211706, 1211707, 1211710, 1211793, 1211844, 1212084, 1213319 CVE References: CVE-2023-0667, CVE-2023-0668, CVE-2023-2855, CVE-2023-2856, CVE-2023-2857, CVE-2023-2858, CVE-2023-2879, CVE-2023-2952, CVE-2023-3648 Sources used: openSUSE Leap 15.4 (src): wireshark-3.6.15-150000.3.97.1 openSUSE Leap 15.5 (src): wireshark-3.6.15-150000.3.97.1 Basesystem Module 15-SP4 (src): wireshark-3.6.15-150000.3.97.1 Basesystem Module 15-SP5 (src): wireshark-3.6.15-150000.3.97.1 Desktop Applications Module 15-SP4 (src): wireshark-3.6.15-150000.3.97.1 Desktop Applications Module 15-SP5 (src): wireshark-3.6.15-150000.3.97.1 SUSE Linux Enterprise Real Time 15 SP3 (src): wireshark-3.6.15-150000.3.97.1 SUSE Manager Proxy 4.2 (src): wireshark-3.6.15-150000.3.97.1 SUSE Manager Retail Branch Server 4.2 (src): wireshark-3.6.15-150000.3.97.1 SUSE Manager Server 4.2 (src): wireshark-3.6.15-150000.3.97.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.