Amazon Linux 2023 Security Advisory: ALAS-2023-197
Advisory Release Date: 2023-06-05 16:39 Pacific
Advisory Updated Date: 2025-02-26 19:34 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version between 4.0.0 to 4.0.5, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running
Wireshark.
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-18.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19085 (CVE-2023-0666)
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. (CVE-2023-0667)
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. (CVE-2023-0668)
A vulnerability exists in wireshark version 4.0.0 to 4.0.5 which would allow a remote attacker to crash wireshark by either injecting a malformed packet onto the wire or by convincing a user to read a malformed packet trace file. (CVE-2023-2854)
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file (CVE-2023-2855)
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file (CVE-2023-2856)
A vulnerability was found in wireshark versions between 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13. The attacker would need the victim to open a maliciously crafted wireshark trace file, which would cause wireshark to crash. (CVE-2023-2857)
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file (CVE-2023-2858)
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file (CVE-2023-2879)
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file (CVE-2023-2952)
Affected Packages:
wireshark
Issue Correction:
Run dnf update wireshark --releasever 2023.0.20230607 to update your system.
aarch64:
wireshark-cli-debuginfo-4.0.6-1.amzn2023.0.1.aarch64
wireshark-cli-4.0.6-1.amzn2023.0.1.aarch64
wireshark-devel-4.0.6-1.amzn2023.0.1.aarch64
wireshark-debugsource-4.0.6-1.amzn2023.0.1.aarch64
src:
wireshark-4.0.6-1.amzn2023.0.1.src
x86_64:
wireshark-cli-debuginfo-4.0.6-1.amzn2023.0.1.x86_64
wireshark-cli-4.0.6-1.amzn2023.0.1.x86_64
wireshark-devel-4.0.6-1.amzn2023.0.1.x86_64
wireshark-debugsource-4.0.6-1.amzn2023.0.1.x86_64