CVE-2023-1161: Buffer copy without checking size of input ('classic buffer overflow') in Wireshark in Wireshark Foundation Wireshark
ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file
AI Analysis
Technical Summary
CVE-2023-1161 is a buffer overflow vulnerability classified under CWE-120 affecting the Wireshark network protocol analyzer maintained by the Wireshark Foundation. The flaw exists in the ISO 15765 and ISO 10681 protocol dissectors within Wireshark versions 3.6.0 through 3.6.11 and 4.0.0 through 4.0.3. Specifically, the vulnerability arises due to a buffer copy operation that does not verify the size of the input data, leading to a classic buffer overflow condition. This can be triggered by processing specially crafted network packets or capture files containing malformed ISO 15765 or ISO 10681 protocol data. The consequence is a denial of service (DoS) condition where Wireshark crashes, potentially disrupting network analysis or forensic investigations. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R) to open malicious files or receive malicious packets. The impact affects confidentiality, integrity, and availability to a limited degree, primarily through application crashes and possible information leakage during the crash. No public exploits have been reported, and no patches were linked in the provided data, but users are advised to upgrade to versions beyond 3.6.11 and 4.0.3 where the issue is resolved. This vulnerability is significant for organizations relying on Wireshark for network monitoring, incident response, or forensic analysis, as attackers could disrupt these processes by sending crafted packets or files.
Potential Impact
For European organizations, the primary impact of CVE-2023-1161 is the potential denial of service on Wireshark instances used for network traffic analysis, monitoring, and forensic investigations. This could delay detection and response to network incidents, affecting cybersecurity operations. While the vulnerability does not enable remote code execution or full system compromise, repeated crashes could degrade operational efficiency and cause temporary loss of visibility into network traffic. Organizations in sectors such as telecommunications, critical infrastructure, financial services, and government agencies that rely heavily on Wireshark for packet analysis may experience operational disruptions. Additionally, if attackers craft malicious capture files distributed internally or externally, unsuspecting analysts opening these files could trigger crashes. The confidentiality and integrity impacts are limited but not negligible, as crashes might expose partial memory contents or cause loss of captured data. Overall, the threat is moderate but warrants timely remediation to maintain robust network security posture.
Mitigation Recommendations
1. Upgrade Wireshark to versions later than 3.6.11 or 4.0.3 where this vulnerability is patched. 2. Avoid opening capture files from untrusted or unknown sources to reduce risk of triggering the overflow. 3. Implement strict network segmentation and filtering to limit exposure to malicious ISO 15765 and ISO 10681 protocol traffic, especially from external or untrusted networks. 4. Use sandboxing or isolated environments for analyzing suspicious capture files to contain potential crashes. 5. Monitor Wireshark application logs and system stability to detect abnormal crashes that may indicate exploitation attempts. 6. Educate network analysts and incident responders about the risk and safe handling of capture files. 7. Employ endpoint protection solutions that can detect anomalous behavior or crashes in Wireshark processes. 8. Regularly review and update incident response procedures to handle potential denial of service scenarios affecting network analysis tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2023-1161: Buffer copy without checking size of input ('classic buffer overflow') in Wireshark in Wireshark Foundation Wireshark
Description
ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file
AI-Powered Analysis
Technical Analysis
CVE-2023-1161 is a buffer overflow vulnerability classified under CWE-120 affecting the Wireshark network protocol analyzer maintained by the Wireshark Foundation. The flaw exists in the ISO 15765 and ISO 10681 protocol dissectors within Wireshark versions 3.6.0 through 3.6.11 and 4.0.0 through 4.0.3. Specifically, the vulnerability arises due to a buffer copy operation that does not verify the size of the input data, leading to a classic buffer overflow condition. This can be triggered by processing specially crafted network packets or capture files containing malformed ISO 15765 or ISO 10681 protocol data. The consequence is a denial of service (DoS) condition where Wireshark crashes, potentially disrupting network analysis or forensic investigations. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R) to open malicious files or receive malicious packets. The impact affects confidentiality, integrity, and availability to a limited degree, primarily through application crashes and possible information leakage during the crash. No public exploits have been reported, and no patches were linked in the provided data, but users are advised to upgrade to versions beyond 3.6.11 and 4.0.3 where the issue is resolved. This vulnerability is significant for organizations relying on Wireshark for network monitoring, incident response, or forensic analysis, as attackers could disrupt these processes by sending crafted packets or files.
Potential Impact
For European organizations, the primary impact of CVE-2023-1161 is the potential denial of service on Wireshark instances used for network traffic analysis, monitoring, and forensic investigations. This could delay detection and response to network incidents, affecting cybersecurity operations. While the vulnerability does not enable remote code execution or full system compromise, repeated crashes could degrade operational efficiency and cause temporary loss of visibility into network traffic. Organizations in sectors such as telecommunications, critical infrastructure, financial services, and government agencies that rely heavily on Wireshark for packet analysis may experience operational disruptions. Additionally, if attackers craft malicious capture files distributed internally or externally, unsuspecting analysts opening these files could trigger crashes. The confidentiality and integrity impacts are limited but not negligible, as crashes might expose partial memory contents or cause loss of captured data. Overall, the threat is moderate but warrants timely remediation to maintain robust network security posture.
Mitigation Recommendations
1. Upgrade Wireshark to versions later than 3.6.11 or 4.0.3 where this vulnerability is patched. 2. Avoid opening capture files from untrusted or unknown sources to reduce risk of triggering the overflow. 3. Implement strict network segmentation and filtering to limit exposure to malicious ISO 15765 and ISO 10681 protocol traffic, especially from external or untrusted networks. 4. Use sandboxing or isolated environments for analyzing suspicious capture files to contain potential crashes. 5. Monitor Wireshark application logs and system stability to detect abnormal crashes that may indicate exploitation attempts. 6. Educate network analysts and incident responders about the risk and safe handling of capture files. 7. Employ endpoint protection solutions that can detect anomalous behavior or crashes in Wireshark processes. 8. Regularly review and update incident response procedures to handle potential denial of service scenarios affecting network analysis tools.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2023-03-03T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092629fe7723195e0b5cf0
Added to database: 11/3/2025, 10:01:13 PM
Last enriched: 11/4/2025, 12:08:03 AM
Last updated: 2/7/2026, 7:38:45 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.