一、漏洞信息
漏洞编号:[CVE-2023-2855](https://nvd.nist.gov/vuln/detail/CVE-2023-2855)
漏洞归属组件:[wireshark](https://gitee.com/src-openeuler/wireshark)
漏洞归属的版本:3.6.0,3.6.11,3.6.2,3.6.3
CVSS V3.0分值:
BaseScore:7.8 High
Vector:CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞简述:
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
漏洞公开时间:2023-05-27 05:15:00
漏洞创建时间:2023-05-25 13:10:08
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2023-2855
<details>
<summary>更多参考(点击展开)</summary>
| 参考来源 | 参考链接 | 来源链接 |
| ------- | -------- | -------- |
| nvd | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json | |
| nvd | https://gitlab.com/wireshark/wireshark/-/issues/19062 | |
| nvd | https://www.wireshark.org/security/wnpa-sec-2023-12.html | |
| redhat | https://access.redhat.com/security/cve/CVE-2023-2855 | |
| suse_bugzilla | https://gitlab.com/wireshark/wireshark/-/issues/19062 | https://bugzilla.suse.com/show_bug.cgi?id=1211703 |
| suse_bugzilla | https://www.wireshark.org/security/wnpa-sec-2023-12 | https://bugzilla.suse.com/show_bug.cgi?id=1211703 |
| redhat_bugzilla | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json | https://bugzilla.redhat.com/show_bug.cgi?id=2210822 |
| redhat_bugzilla | https://gitlab.com/wireshark/wireshark/-/issues/19062 | https://bugzilla.redhat.com/show_bug.cgi?id=2210822 |
| redhat_bugzilla | https://www.wireshark.org/security/wnpa-sec-2023-12.html | https://bugzilla.redhat.com/show_bug.cgi?id=2210822 |
| debian | | https://security-tracker.debian.org/tracker/CVE-2023-2855 |
| wireshark | https://gitlab.com/wireshark/wireshark/-/issues/19062 | https://www.wireshark.org/security/wnpa-sec-2023-12.html |
| wireshark | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855 | https://www.wireshark.org/security/wnpa-sec-2023-12.html |
| gitlab_cves | https://www.wireshark.org/security/wnpa-sec-2023-12.html | |
| gitlab_cves | https://gitlab.com/wireshark/wireshark/-/issues/19062 | |
| gitlab_cves | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json | |
| cve_search | | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json |
| cve_search | | https://gitlab.com/wireshark/wireshark/-/issues/19062 |
| cve_search | | https://www.wireshark.org/security/wnpa-sec-2023-12.html |
| nvd | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json | |
| nvd | https://gitlab.com/wireshark/wireshark/-/issues/19062 | |
| nvd | https://www.wireshark.org/security/wnpa-sec-2023-12.html | |
</details>
漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:
<details>
<summary>详情(点击展开)</summary>
无
</details>
二、漏洞分析结构反馈
影响性分析说明:
Wireshark 4.0.0至4.0.5和3.6.0至3.6.13中的Candump日志解析器崩溃允许通过特制的捕获文件拒绝服务
openEuler评分:
7.8
Vector:CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-22.03-LTS(3.6.0):受影响
2.openEuler-22.03-LTS-SP1(3.6.11):受影响
3.openEuler-20.03-LTS-SP1(2.6.2):不受影响
4.openEuler-20.03-LTS-SP3(2.6.2):不受影响
修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(2.6.2):否
2.openEuler-20.03-LTS-SP3(2.6.2):否
3.openEuler-22.03-LTS(3.6.0):否
4.openEuler-22.03-LTS-SP1(3.6.11):否
三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2023-1322