Bugzilla – Bug 1217272
VUL-0: CVE-2023-6175: wireshark: NetScreen file parser crash
Last modified: 2024-02-15 10:17:12 UTC
Affected versions: 4.0.0 to 4.0.x, 3.6.0 to 3.6.x Fixed versions: 4.0.x, 3.6.x Description The NetScreen file parser could crash. Discovered by Anonymous working with Trend Micro Zero Day Initiative Impact It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Resolution Upgrade to Wireshark 4.0.x, 3.6.x or later. References: https://www.wireshark.org/security/wnpa-sec-2023-29.html https://gitlab.com/wireshark/wireshark/-/issues/19404
Tracking as affected: - SUSE:ALP:Source:Standard:1.0/wireshark 4.0.10 - SUSE:SLE-15:Update/wireshark 3.6.17 - openSUSE:Factory/wireshark 4.0.10
SUSE-SU-2023:4938-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1217272 CVE References: CVE-2023-6175 Sources used: openSUSE Leap 15.4 (src): wireshark-3.6.19-150000.3.106.1 openSUSE Leap 15.5 (src): wireshark-3.6.19-150000.3.106.1 Basesystem Module 15-SP4 (src): wireshark-3.6.19-150000.3.106.1 Basesystem Module 15-SP5 (src): wireshark-3.6.19-150000.3.106.1 Desktop Applications Module 15-SP4 (src): wireshark-3.6.19-150000.3.106.1 Desktop Applications Module 15-SP5 (src): wireshark-3.6.19-150000.3.106.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done