CVE-2023-1161: Buffer copy without checking size of input ('classic buffer overflow') in Wireshark in Wireshark Foundation Wireshark
ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file
AI Analysis
Technical Summary
CVE-2023-1161 is a buffer overflow vulnerability classified under CWE-120 affecting the Wireshark network protocol analyzer maintained by the Wireshark Foundation. The flaw exists in the ISO 15765 and ISO 10681 protocol dissectors within Wireshark versions 3.6.0 through 3.6.11 and 4.0.0 through 4.0.3. Specifically, the vulnerability arises due to a buffer copy operation that does not verify the size of the input data, leading to a classic buffer overflow condition. This can be triggered by processing specially crafted network packets or capture files containing malformed ISO 15765 or ISO 10681 protocol data. The consequence is a denial of service (DoS) condition where Wireshark crashes, potentially disrupting network analysis or forensic investigations. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R) to open malicious files or receive malicious packets. The impact affects confidentiality, integrity, and availability to a limited degree, primarily through application crashes and possible information leakage during the crash. No public exploits have been reported, and no patches were linked in the provided data, but users are advised to upgrade to versions beyond 3.6.11 and 4.0.3 where the issue is resolved. This vulnerability is significant for organizations relying on Wireshark for network monitoring, incident response, or forensic analysis, as attackers could disrupt these processes by sending crafted packets or files.
Potential Impact
For European organizations, the primary impact of CVE-2023-1161 is the potential denial of service on Wireshark instances used for network traffic analysis, monitoring, and forensic investigations. This could delay detection and response to network incidents, affecting cybersecurity operations. While the vulnerability does not enable remote code execution or full system compromise, repeated crashes could degrade operational efficiency and cause temporary loss of visibility into network traffic. Organizations in sectors such as telecommunications, critical infrastructure, financial services, and government agencies that rely heavily on Wireshark for packet analysis may experience operational disruptions. Additionally, if attackers craft malicious capture files distributed internally or externally, unsuspecting analysts opening these files could trigger crashes. The confidentiality and integrity impacts are limited but not negligible, as crashes might expose partial memory contents or cause loss of captured data. Overall, the threat is moderate but warrants timely remediation to maintain robust network security posture.
Mitigation Recommendations
1. Upgrade Wireshark to versions later than 3.6.11 or 4.0.3 where this vulnerability is patched. 2. Avoid opening capture files from untrusted or unknown sources to reduce risk of triggering the overflow. 3. Implement strict network segmentation and filtering to limit exposure to malicious ISO 15765 and ISO 10681 protocol traffic, especially from external or untrusted networks. 4. Use sandboxing or isolated environments for analyzing suspicious capture files to contain potential crashes. 5. Monitor Wireshark application logs and system stability to detect abnormal crashes that may indicate exploitation attempts. 6. Educate network analysts and incident responders about the risk and safe handling of capture files. 7. Employ endpoint protection solutions that can detect anomalous behavior or crashes in Wireshark processes. 8. Regularly review and update incident response procedures to handle potential denial of service scenarios affecting network analysis tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2023-1161: Buffer copy without checking size of input ('classic buffer overflow') in Wireshark in Wireshark Foundation Wireshark
Description
ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file
AI-Powered Analysis
Technical Analysis
CVE-2023-1161 is a buffer overflow vulnerability classified under CWE-120 affecting the Wireshark network protocol analyzer maintained by the Wireshark Foundation. The flaw exists in the ISO 15765 and ISO 10681 protocol dissectors within Wireshark versions 3.6.0 through 3.6.11 and 4.0.0 through 4.0.3. Specifically, the vulnerability arises due to a buffer copy operation that does not verify the size of the input data, leading to a classic buffer overflow condition. This can be triggered by processing specially crafted network packets or capture files containing malformed ISO 15765 or ISO 10681 protocol data. The consequence is a denial of service (DoS) condition where Wireshark crashes, potentially disrupting network analysis or forensic investigations. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R) to open malicious files or receive malicious packets. The impact affects confidentiality, integrity, and availability to a limited degree, primarily through application crashes and possible information leakage during the crash. No public exploits have been reported, and no patches were linked in the provided data, but users are advised to upgrade to versions beyond 3.6.11 and 4.0.3 where the issue is resolved. This vulnerability is significant for organizations relying on Wireshark for network monitoring, incident response, or forensic analysis, as attackers could disrupt these processes by sending crafted packets or files.
Potential Impact
For European organizations, the primary impact of CVE-2023-1161 is the potential denial of service on Wireshark instances used for network traffic analysis, monitoring, and forensic investigations. This could delay detection and response to network incidents, affecting cybersecurity operations. While the vulnerability does not enable remote code execution or full system compromise, repeated crashes could degrade operational efficiency and cause temporary loss of visibility into network traffic. Organizations in sectors such as telecommunications, critical infrastructure, financial services, and government agencies that rely heavily on Wireshark for packet analysis may experience operational disruptions. Additionally, if attackers craft malicious capture files distributed internally or externally, unsuspecting analysts opening these files could trigger crashes. The confidentiality and integrity impacts are limited but not negligible, as crashes might expose partial memory contents or cause loss of captured data. Overall, the threat is moderate but warrants timely remediation to maintain robust network security posture.
Mitigation Recommendations
1. Upgrade Wireshark to versions later than 3.6.11 or 4.0.3 where this vulnerability is patched. 2. Avoid opening capture files from untrusted or unknown sources to reduce risk of triggering the overflow. 3. Implement strict network segmentation and filtering to limit exposure to malicious ISO 15765 and ISO 10681 protocol traffic, especially from external or untrusted networks. 4. Use sandboxing or isolated environments for analyzing suspicious capture files to contain potential crashes. 5. Monitor Wireshark application logs and system stability to detect abnormal crashes that may indicate exploitation attempts. 6. Educate network analysts and incident responders about the risk and safe handling of capture files. 7. Employ endpoint protection solutions that can detect anomalous behavior or crashes in Wireshark processes. 8. Regularly review and update incident response procedures to handle potential denial of service scenarios affecting network analysis tools.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2023-03-03T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092629fe7723195e0b5cf0
Added to database: 11/3/2025, 10:01:13 PM
Last enriched: 11/4/2025, 12:08:03 AM
Last updated: 11/6/2025, 12:36:24 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report
MediumAutomotive IT Firm Hyundai AutoEver Discloses Data Breach
MediumState-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
MediumCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.