Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-1161: Buffer copy without checking size of input ('classic buffer overflow') in Wireshark in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-1161cvecve-2023-1161
Published: Mon Mar 06 2023 (03/06/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/04/2025, 00:08:03 UTC

Technical Analysis

CVE-2023-1161 is a buffer overflow vulnerability classified under CWE-120 affecting the Wireshark network protocol analyzer maintained by the Wireshark Foundation. The flaw exists in the ISO 15765 and ISO 10681 protocol dissectors within Wireshark versions 3.6.0 through 3.6.11 and 4.0.0 through 4.0.3. Specifically, the vulnerability arises due to a buffer copy operation that does not verify the size of the input data, leading to a classic buffer overflow condition. This can be triggered by processing specially crafted network packets or capture files containing malformed ISO 15765 or ISO 10681 protocol data. The consequence is a denial of service (DoS) condition where Wireshark crashes, potentially disrupting network analysis or forensic investigations. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R) to open malicious files or receive malicious packets. The impact affects confidentiality, integrity, and availability to a limited degree, primarily through application crashes and possible information leakage during the crash. No public exploits have been reported, and no patches were linked in the provided data, but users are advised to upgrade to versions beyond 3.6.11 and 4.0.3 where the issue is resolved. This vulnerability is significant for organizations relying on Wireshark for network monitoring, incident response, or forensic analysis, as attackers could disrupt these processes by sending crafted packets or files.

Potential Impact

For European organizations, the primary impact of CVE-2023-1161 is the potential denial of service on Wireshark instances used for network traffic analysis, monitoring, and forensic investigations. This could delay detection and response to network incidents, affecting cybersecurity operations. While the vulnerability does not enable remote code execution or full system compromise, repeated crashes could degrade operational efficiency and cause temporary loss of visibility into network traffic. Organizations in sectors such as telecommunications, critical infrastructure, financial services, and government agencies that rely heavily on Wireshark for packet analysis may experience operational disruptions. Additionally, if attackers craft malicious capture files distributed internally or externally, unsuspecting analysts opening these files could trigger crashes. The confidentiality and integrity impacts are limited but not negligible, as crashes might expose partial memory contents or cause loss of captured data. Overall, the threat is moderate but warrants timely remediation to maintain robust network security posture.

Mitigation Recommendations

1. Upgrade Wireshark to versions later than 3.6.11 or 4.0.3 where this vulnerability is patched. 2. Avoid opening capture files from untrusted or unknown sources to reduce risk of triggering the overflow. 3. Implement strict network segmentation and filtering to limit exposure to malicious ISO 15765 and ISO 10681 protocol traffic, especially from external or untrusted networks. 4. Use sandboxing or isolated environments for analyzing suspicious capture files to contain potential crashes. 5. Monitor Wireshark application logs and system stability to detect abnormal crashes that may indicate exploitation attempts. 6. Educate network analysts and incident responders about the risk and safe handling of capture files. 7. Employ endpoint protection solutions that can detect anomalous behavior or crashes in Wireshark processes. 8. Regularly review and update incident response procedures to handle potential denial of service scenarios affecting network analysis tools.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-03-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092629fe7723195e0b5cf0

Added to database: 11/3/2025, 10:01:13 PM

Last enriched: 11/4/2025, 12:08:03 AM

Last updated: 11/6/2025, 12:36:24 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats