{"uuid": "d26b47b0-3186-433e-ace1-a93a1a4c3c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0668", "type": "seen", "source": "https://t.me/cibsecurity/65026", "content": "\u203c CVE-2023-0668 \u203c\n\nDue to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-07T07:35:48.000000Z"}