Wireshark.NetScreen.Dissector.Heap-based.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in Wireshark Wireshark.
This vulnerability is due to improper input validation when handling NetScreen packet capture files. A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the current process.
Affected Products
Wireshark Wireshark 3.6.0 to 3.6.18
Wireshark Wireshark 4.0.0 to 4.0.10
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.wireshark.org/security/wnpa-sec-2023-29.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2024-04-18 | 27.771 |