{"vulnerability": "CVE-2023-0668", "sightings": [{"uuid": "152562c7-4189-43bc-a71f-0e178e84dfd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0668", "type": "seen", "source": "http://takeonme.org/cves/cve-2023-0668/", "content": "", "creation_timestamp": "2023-06-06T16:37:00.000000Z"}, {"uuid": "3b554be2-4eea-43c8-8e98-7fcc2468798e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0668", "type": "seen", "source": "http://takeonme.org/cve/", "content": "", "creation_timestamp": "2000-12-31T23:00:00.000000Z"}, {"uuid": "ab64ab83-2025-4af4-9a36-8e5ad50adda9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0668", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/449", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-0668\n\ud83d\udd39 Description: Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.\n\ud83d\udccf Published: 2023-06-07T02:32:45.095Z\n\ud83d\udccf Modified: 2025-01-07T14:59:00.663Z\n\ud83d\udd17 References:\n1. https://takeonme.org/cves/CVE-2023-0668.html\n2. https://gitlab.com/wireshark/wireshark/-/issues/19087\n3. https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html\n4. https://www.wireshark.org/security/wnpa-sec-2023-19.html\n5. https://www.debian.org/security/2023/dsa-5429\n6. https://security.gentoo.org/glsa/202309-02", "creation_timestamp": "2025-01-07T15:39:59.000000Z"}, {"uuid": "d26b47b0-3186-433e-ace1-a93a1a4c3c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0668", "type": "seen", "source": "https://t.me/cibsecurity/65026", "content": "\u203c CVE-2023-0668 \u203c\n\nDue to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-07T07:35:48.000000Z"}]}