Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4513: CWE-401: Missing Release of Memory after Effective Lifetime in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-4513cvecve-2023-4513cwe-401
Published: Thu Aug 24 2023 (08/24/2023, 06:30:50 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/03/2025, 22:18:07 UTC

Technical Analysis

CVE-2023-4513 is a vulnerability classified under CWE-401 (Missing Release of Memory after Effective Lifetime) affecting the Bluetooth Service Discovery Protocol (SDP) dissector in Wireshark versions 3.6.0 through 3.6.15 and 4.0.0 through 4.0.7. The flaw manifests as a memory leak when processing crafted Bluetooth SDP packets or capture files, which do not properly release allocated memory after use. This can be exploited by an attacker who injects malicious packets into a network or provides a specially crafted capture file that, when opened by a user in Wireshark, causes the application to consume increasing amounts of memory. Over time, this resource exhaustion can lead to denial of service (DoS), causing Wireshark to crash or become unresponsive. The CVSS v3.1 score of 5.3 reflects a medium severity, with an attack vector of local (AV:L), low complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact affects confidentiality, integrity, and availability to a limited degree, primarily availability due to potential crashes. No patches were linked in the provided data, but users are advised to monitor Wireshark Foundation releases for fixes. No known exploits in the wild have been reported, reducing immediate risk but warranting proactive mitigation. This vulnerability is particularly relevant for organizations using Wireshark for network troubleshooting and security analysis, as it could disrupt these critical functions.

Potential Impact

For European organizations, the primary impact of CVE-2023-4513 is operational disruption due to denial of service in Wireshark, a widely used network protocol analyzer. Organizations relying on Wireshark for network monitoring, incident response, and forensic analysis may experience interruptions if malicious capture files or packets are introduced, either accidentally or deliberately. This could delay detection and response to other security incidents, indirectly increasing risk exposure. Confidentiality and integrity impacts are limited but possible if Wireshark crashes during analysis, potentially causing loss of volatile forensic data. The requirement for user interaction (opening a malicious capture file) limits remote exploitation but does not eliminate risk, especially in environments where untrusted capture files are shared or downloaded. The absence of known exploits in the wild reduces immediate threat but does not preclude targeted attacks, especially against critical infrastructure or government entities. Overall, the impact is moderate but significant in environments where Wireshark availability is critical.

Mitigation Recommendations

1. Monitor Wireshark Foundation announcements and promptly apply patches once available for versions 3.6.x and 4.0.x. 2. Avoid opening capture files from untrusted or unknown sources; implement strict policies for handling external capture files. 3. Use sandboxing or isolated environments when analyzing suspicious capture files to contain potential memory leaks or crashes. 4. Limit network exposure of systems running Wireshark to reduce the risk of receiving crafted Bluetooth SDP packets. 5. Educate users and analysts about the risk of opening unverified capture files and encourage verification of file provenance. 6. Consider alternative tools or updated Wireshark versions that have addressed this vulnerability for critical analysis tasks. 7. Implement monitoring for abnormal memory usage on systems running Wireshark to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-08-24T06:30:35.789Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092637fe7723195e0b624c

Added to database: 11/3/2025, 10:01:27 PM

Last enriched: 11/3/2025, 10:18:07 PM

Last updated: 11/6/2025, 11:08:14 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats