{"id":"CVE-2023-0412","details":"TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file","modified":"2026-03-20T12:25:44.591827Z","published":"2023-01-24T00:00:00Z","related":["SUSE-SU-2023:0343-1","openSUSE-SU-2024:12647-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0412.json","cna_assigner":"GitLab"},"references":[{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2023-07.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0412.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0412"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/18770"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"last_affected":"1c21cf400821d986756d23e04a2bb9cdc095a98f"},{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"last_affected":"415456d133701e83d2f0aac3d90f26879fb3dad1"}],"database_specific":{"versions":[{"introduced":"3.6.0"},{"last_affected":"3.6.10"},{"introduced":"4.0.0"},{"last_affected":"4.0.2"}]}}],"versions":["v3.6.0","v3.6.1","v3.6.10","v3.6.10rc0","v3.6.1rc0","v3.6.2","v3.6.2rc0","v3.6.3","v3.6.3rc0","v3.6.4","v3.6.4rc0","v3.6.5","v3.6.5rc0","v3.6.6","v3.6.6rc0","v3.6.7","v3.6.7rc0","v3.6.8","v3.6.8rc0","v3.6.9","v3.6.9rc0","v4.0.0","v4.0.1","v4.0.1rc0","v4.0.2","v4.0.2rc0","wireshark-3.6.0","wireshark-3.6.1","wireshark-3.6.10","wireshark-3.6.2","wireshark-3.6.3","wireshark-3.6.4","wireshark-3.6.5","wireshark-3.6.6","wireshark-3.6.7","wireshark-3.6.8","wireshark-3.6.9","wireshark-4.0.0","wireshark-4.0.1","wireshark-4.0.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0412.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"fixed":"c552f74cdc235956749afb80f6536ca8c9c145d7"}],"database_specific":{"versions":[{"introduced":"4.0.0"},{"fixed":"4.0.3"}]}},{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"fixed":"6529b24d7c782e202b0051d3be8dd07f850e8954"}],"database_specific":{"versions":[{"introduced":"3.6.0"},{"fixed":"3.6.11"}]}}],"versions":["v3.6.0","v3.6.1","v3.6.10","v3.6.10rc0","v3.6.11rc0","v3.6.1rc0","v3.6.2","v3.6.2rc0","v3.6.3","v3.6.3rc0","v3.6.4","v3.6.4rc0","v3.6.5","v3.6.5rc0","v3.6.6","v3.6.6rc0","v3.6.7","v3.6.7rc0","v3.6.8","v3.6.8rc0","v3.6.9","v3.6.9rc0","v4.0.0","v4.0.1","v4.0.1rc0","v4.0.2","v4.0.2rc0","v4.0.3rc0","wireshark-3.6.0","wireshark-3.6.1","wireshark-3.6.10","wireshark-3.6.2","wireshark-3.6.3","wireshark-3.6.4","wireshark-3.6.5","wireshark-3.6.6","wireshark-3.6.7","wireshark-3.6.8","wireshark-3.6.9","wireshark-4.0.0","wireshark-4.0.1","wireshark-4.0.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0412.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}