CVE-2023-1992

RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
References
Link Resource
https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json Third Party Advisory
https://gitlab.com/wireshark/wireshark/-/issues/18852 Exploit Issue Tracking Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
https://security.gentoo.org/glsa/202309-02 Third Party Advisory
https://www.debian.org/security/2023/dsa-5429 Third Party Advisory
https://www.wireshark.org/security/wnpa-sec-2023-09.html Vendor Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json Third Party Advisory
https://gitlab.com/wireshark/wireshark/-/issues/18852 Exploit Issue Tracking Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
https://security.gentoo.org/glsa/202309-02 Third Party Advisory
https://www.debian.org/security/2023/dsa-5429 Third Party Advisory
https://www.wireshark.org/security/wnpa-sec-2023-09.html Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

21 Nov 2024, 07:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 6.3
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json - Third Party Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json - Third Party Advisory
References () https://gitlab.com/wireshark/wireshark/-/issues/18852 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://gitlab.com/wireshark/wireshark/-/issues/18852 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/ -
References () https://security.gentoo.org/glsa/202309-02 - Third Party Advisory () https://security.gentoo.org/glsa/202309-02 - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5429 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5429 - Third Party Advisory
References () https://www.wireshark.org/security/wnpa-sec-2023-09.html - Vendor Advisory () https://www.wireshark.org/security/wnpa-sec-2023-09.html - Vendor Advisory

16 Jun 2023, 04:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5429 -

29 Apr 2023, 21:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html -

22 Apr 2023, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-12 21:15

Updated : 2025-02-07 17:15


NVD link : CVE-2023-1992

Mitre link : CVE-2023-1992

CVE.ORG link : CVE-2023-1992


JSON object : View

Products Affected

wireshark

  • wireshark

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption