{"id":"CVE-2023-0415","details":"iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file","modified":"2026-05-18T05:55:19.981561897Z","published":"2023-01-24T00:00:00Z","related":["SUSE-SU-2023:0343-1","openSUSE-SU-2024:12647-1"],"database_specific":{"cna_assigner":"GitLab","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0415.json"},"references":[{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2023-05.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/0xxx/CVE-2023-0415.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0415"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/18796"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"last_affected":"1c21cf400821d986756d23e04a2bb9cdc095a98f"},{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"last_affected":"415456d133701e83d2f0aac3d90f26879fb3dad1"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"3.6.0"},{"last_affected":"3.6.10"},{"introduced":"4.0.0"},{"last_affected":"4.0.2"}],"cpe":"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"}}],"versions":["wireshark-3.6.10","v3.6.10","wireshark-4.0.2","v4.0.2","v3.6.10rc0","v4.0.2rc0","wireshark-4.0.1","v4.0.1","wireshark-3.6.9","v3.6.9","v4.0.1rc0","wireshark-4.0.0","v4.0.0","v3.6.9rc0","wireshark-3.6.8","v3.6.8","v3.6.8rc0","wireshark-3.6.7","v3.6.7","v3.6.7rc0","wireshark-3.6.6","v3.6.6","v3.6.6rc0","wireshark-3.6.5","v3.6.5","v3.6.5rc0","wireshark-3.6.4","v3.6.4","v3.6.4rc0","wireshark-3.6.3","v3.6.3","v3.6.3rc0","wireshark-3.6.2","v3.6.2","v3.6.2rc0","wireshark-3.6.1","v3.6.1","v3.6.1rc0","wireshark-3.6.0","v3.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0415.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"last_affected":"1c21cf400821d986756d23e04a2bb9cdc095a98f"},{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"last_affected":"415456d133701e83d2f0aac3d90f26879fb3dad1"}],"database_specific":{"cpe":"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"3.6.0"},{"last_affected":"3.6.10"},{"introduced":"4.0.0"},{"last_affected":"4.0.2"}],"source":"CPE_FIELD"}}],"versions":["wireshark-3.6.10","v3.6.10","wireshark-4.0.2","v4.0.2","v3.6.10rc0","v4.0.2rc0","wireshark-4.0.1","v4.0.1","wireshark-3.6.9","v3.6.9","v4.0.1rc0","wireshark-4.0.0","v4.0.0","v3.6.9rc0","wireshark-3.6.8","v3.6.8","v3.6.8rc0","wireshark-3.6.7","v3.6.7","v3.6.7rc0","wireshark-3.6.6","v3.6.6","v3.6.6rc0","wireshark-3.6.5","v3.6.5","v3.6.5rc0","wireshark-3.6.4","v3.6.4","v3.6.4rc0","wireshark-3.6.3","v3.6.3","v3.6.3rc0","wireshark-3.6.2","v3.6.2","v3.6.2rc0","wireshark-3.6.1","v3.6.1","v3.6.1rc0","wireshark-3.6.0","v3.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0415.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}