HTTP: Wireshark NetScreen Dissector Heap-based Buffer Overflow

This signature detects attempts to exploit a known vulnerability against Wireshark. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the current process.

Extended Description

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

Affected Products

Wireshark wireshark

Short Name
HTTP:OVERFLOW:WIRESHRK-NTSCREEN
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2023-6175 Dissector Heap-based NetScreen Overflow Wireshark
Release Date
05/08/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3800
False Positive
Unknown
Vendors

Wireshark

Found a potential security threat?