Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-0416: Expired pointer dereference in Wireshark in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-0416cvecve-2023-0416
Published: Tue Jan 24 2023 (01/24/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/04/2025, 00:06:43 UTC

Technical Analysis

CVE-2023-0416 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 3.6.0 through 3.6.10 and 4.0.0 through 4.0.2. The issue arises from an expired pointer dereference in the GNW dissector component, categorized under CWE-404 (Improper Resource Shutdown or Release). When Wireshark processes a specially crafted capture file or receives maliciously crafted packets, the expired pointer dereference can cause the application to crash, resulting in a denial of service (DoS). The vulnerability has a CVSS 3.1 base score of 6.3, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact affects confidentiality, integrity, and availability to a low degree (C:L/I:L/A:L). This means that while the primary impact is service disruption, there is some limited risk to data confidentiality and integrity. The vulnerability does not require authentication but does require the user to open a malicious capture file or be exposed to malicious network traffic. No known exploits have been reported in the wild, and no official patches were linked in the provided data, though it is expected that Wireshark Foundation will release updates addressing this issue. The vulnerability is particularly relevant for organizations relying on Wireshark for network troubleshooting, security monitoring, or forensic analysis, as exploitation can interrupt these critical functions. The GNW dissector is a specific protocol parser within Wireshark, and the flaw in its handling of pointers leads to the crash. Attackers could leverage this by sending crafted packets on the network or distributing malicious capture files to analysts.

Potential Impact

For European organizations, the primary impact of CVE-2023-0416 is the potential denial of service of Wireshark instances used in network monitoring, incident response, and forensic investigations. This can delay detection and response to network threats, increasing the risk of undetected attacks or prolonged outages. Confidentiality and integrity impacts are limited but present, as the crash could potentially be leveraged in complex attack chains. Organizations in sectors with high reliance on network analysis tools—such as telecommunications, finance, critical infrastructure, and government—may experience operational disruptions. The disruption could affect security teams’ ability to analyze traffic and respond to incidents promptly. Additionally, if Wireshark is used in automated monitoring pipelines, crashes could cause gaps in network visibility. Since Wireshark is widely used across Europe, the vulnerability poses a broad risk, especially where older versions remain in use due to operational constraints or delayed patching. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as crafted capture files can be distributed via email or file sharing. The vulnerability also poses a risk in environments where untrusted capture files are analyzed without sufficient sandboxing or isolation.

Mitigation Recommendations

1. Upgrade Wireshark to version 3.6.11, 4.0.3, or later as soon as these patches become available from the Wireshark Foundation. 2. Until patches are applied, restrict the opening of capture files to trusted sources only, and avoid analyzing untrusted or unknown capture files. 3. Implement network segmentation and filtering to limit exposure to malicious packets that could trigger the vulnerability, especially on networks where Wireshark is used. 4. Use sandboxing or containerization techniques to isolate Wireshark processes, minimizing the impact of crashes on host systems. 5. Educate security analysts and network engineers about the risk of opening untrusted capture files and encourage verification of file provenance. 6. Monitor Wireshark usage logs and system stability to detect potential exploitation attempts or crashes. 7. Employ alternative or additional network monitoring tools temporarily if patching is delayed, to maintain visibility. 8. Review and update incident response procedures to account for potential disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-01-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092628fe7723195e0b5ccb

Added to database: 11/3/2025, 10:01:12 PM

Last enriched: 11/4/2025, 12:06:43 AM

Last updated: 11/6/2025, 12:27:37 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats