Skip to content

Commit b0b0332

Browse files
authored
Update exploitability per the Wireshark bug (#156)
See https://gitlab.com/wireshark/wireshark/-/issues/19086#note_1400755665 Signed-off-by: Tod Beardsley <todb@packetfu.com>
1 parent 0c1ce7e commit b0b0332

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

cves/CVE-2023-0667.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Any questions about this disclosure should be directed to **cve@takeonme.org**.
1313

1414
# Executive Summary
1515

16-
Due to failure in validating the length provided by an attacker-crafted [MSMMS](https://wiki.wireshark.org/MSMMS.md) packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. [CVE-2023-0667] appears to be an instance of [CWE-122].
16+
Due to failure in validating the length provided by an attacker-crafted [MSMMS](https://wiki.wireshark.org/MSMMS.md) packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. [CVE-2023-0667] appears to be an instance of [CWE-122].
1717

1818
# Technical Details
1919

0 commit comments

Comments
 (0)