vulnerability

Oracle Linux: CVE-2023-0668: ELSA-2023-6469: wireshark security update (MODERATE)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
May 18, 2023
Added
Nov 16, 2023
Modified
Dec 3, 2025

Description

Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
A flaw was found in the IEEE C37.118 Synchrophasor dissector of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing a buffer overflow, resulting in a denial of service.

Solutions

oracle-linux-upgrade-wiresharkoracle-linux-upgrade-wireshark-clioracle-linux-upgrade-wireshark-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.