Unrated severityNVD Advisory· Published Jun 7, 2023· Updated Nov 3, 2025
Wireshark MSMMS parsing buffer overflow
CVE-2023-0667
Description
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
Affected products
11- osv-coords10 versionspkg:rpm/opensuse/wireshark&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/wireshark&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/wireshark&distro=openSUSE%20Tumbleweedpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP4pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP5pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/wireshark&distro=SUSE%20Manager%20Server%204.2
< 3.6.15-150000.3.97.1+ 9 more
- (no CPE)range: < 3.6.15-150000.3.97.1
- (no CPE)range: < 3.6.15-150000.3.97.1
- (no CPE)range: < 4.0.6-3.1
- (no CPE)range: < 3.6.15-150000.3.97.1
- (no CPE)range: < 3.6.15-150000.3.97.1
- (no CPE)range: < 3.6.15-150000.3.97.1
- (no CPE)range: < 3.6.15-150000.3.97.1
- (no CPE)range: < 3.6.15-150000.3.97.1
- (no CPE)range: < 3.6.15-150000.3.97.1
- (no CPE)range: < 3.6.15-150000.3.97.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- takeonme.org/cves/CVE-2023-0667.htmlmitrethird-party-advisory
- gitlab.com/wireshark/wireshark/-/issues/19086mitreissue-tracking
- security.gentoo.org/glsa/202309-02mitre
News mentions
0No linked articles in our index yet.