{"vulnerability": "CVE-2023-2857", "sightings": [{"uuid": "971099b8-5593-4cb4-b222-f6be148aba9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28578", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "9a90312e-ec23-4e25-9eac-57ed48c50b2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28571", "type": "seen", "source": "https://t.me/cibsecurity/71482", "content": "\u203c CVE-2023-28571 \u203c\n\nInformation disclosure in WLAN HOST while processing the WLAN scan descriptor list during roaming scan.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T12:41:24.000000Z"}, {"uuid": "064c3bca-4c45-40e3-8490-41296d036652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2857", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1785", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-2857\n\ud83d\udd39 Description: BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file\n\ud83d\udccf Published: 2023-05-26T00:00:00\n\ud83d\udccf Modified: 2025-01-15T15:41:45.855Z\n\ud83d\udd17 References:\n1. https://www.wireshark.org/security/wnpa-sec-2023-13.html\n2. https://gitlab.com/wireshark/wireshark/-/issues/19063\n3. https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2857.json\n4. https://www.debian.org/security/2023/dsa-5429\n5. https://security.gentoo.org/glsa/202309-02", "creation_timestamp": "2025-01-15T15:55:16.000000Z"}, {"uuid": "4b720a33-c939-4a7d-9dbb-f25e904d6353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28576", "type": "seen", "source": "https://t.me/arpsyndicate/2378", "content": "#ExploitObserverAlert\n\nCVE-2023-28576\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-28576. The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 5.9\nNVD-ES: 1.0", "creation_timestamp": "2024-01-03T23:08:05.000000Z"}, {"uuid": "2c6a3fe7-835d-4d2e-9298-536bbb96b67f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28573", "type": "seen", "source": "https://t.me/cibsecurity/69826", "content": "\u203c CVE-2023-28573 \u203c\n\nMemory corruption in WLAN HAL while parsing WMI command parameters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T05:28:54.000000Z"}, {"uuid": "b92ed23b-5d89-4efb-9c01-54b72198775a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28578", "type": "seen", "source": "https://t.me/ctinow/199191", "content": "https://ift.tt/OByj7P3\nCVE-2023-28578", "creation_timestamp": "2024-03-04T12:32:00.000000Z"}, {"uuid": "dcd4705f-94d2-4474-ba60-d90aee00727a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28577", "type": "seen", "source": "https://t.me/cibsecurity/67955", "content": "\u203c CVE-2023-28577 \u203c\n\nIn the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-08T14:14:35.000000Z"}, {"uuid": "9992fe4f-65bc-4539-b56b-1ee09377278e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28575", "type": "seen", "source": "https://t.me/cibsecurity/67953", "content": "\u203c CVE-2023-28575 \u203c\n\nThe cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-08T14:14:27.000000Z"}, {"uuid": "01cb5cf0-378f-4092-b527-b4cd8676a3b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28579", "type": "seen", "source": "https://t.me/ctinow/158848", "content": "https://ift.tt/fzE5iZn\nCVE-2023-28579 | Qualcomm WSA8835 WLAN Host memory corruption", "creation_timestamp": "2023-12-23T15:51:27.000000Z"}]}