Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6175: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark Foundation Wireshark

0
High
VulnerabilityCVE-2023-6175cvecve-2023-6175cwe-120
Published: Tue Mar 26 2024 (03/26/2024, 07:30:49 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

AI-Powered Analysis

AILast updated: 11/03/2025, 22:15:31 UTC

Technical Analysis

CVE-2023-6175 is a classic buffer overflow vulnerability (CWE-120) identified in the NetScreen file parser component of Wireshark versions 3.6.0 through 3.6.18 and 4.0.0 through 4.0.10. The flaw stems from the parser performing a buffer copy operation without adequately verifying the size of the input data, which can lead to memory corruption. When a user opens a specially crafted capture file containing malicious NetScreen data, the vulnerability can be triggered, causing Wireshark to crash, resulting in a denial of service (DoS). The CVSS 3.1 base score of 7.8 reflects high severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The scope remains unchanged (S:U), and the impact is high across confidentiality, integrity, and availability (C:H/I:H/A:H), implying potential for memory corruption that could be leveraged for code execution or data leakage, although no such exploits are currently documented. The vulnerability was publicly disclosed on March 26, 2024, with no known exploits in the wild at this time. The absence of patch links suggests that fixes may be pending or recently released but not linked in the source data. Wireshark is widely used by network administrators and security professionals for packet analysis, making this vulnerability significant in environments where untrusted capture files might be opened. Attackers could craft malicious capture files distributed via email, file shares, or compromised websites to trigger the flaw. Given the requirement for user interaction and local access to open files, the attack surface is somewhat limited but still concerning in targeted or insider threat scenarios.

Potential Impact

For European organizations, the impact of CVE-2023-6175 can be substantial, especially in sectors relying heavily on network traffic analysis and monitoring, such as telecommunications, finance, government, and critical infrastructure. A successful exploitation leads to Wireshark crashing, causing denial of service and potential disruption of network diagnostics and incident response activities. The high impact on confidentiality and integrity suggests that memory corruption could be exploited for arbitrary code execution or data leakage, posing risks of further compromise. This could undermine trust in network monitoring tools and delay threat detection. Organizations using affected Wireshark versions on endpoints or analysis workstations are at risk if they open untrusted capture files. The vulnerability could also be leveraged in targeted attacks against security teams or forensic analysts. The disruption of Wireshark functionality may delay incident response and forensic investigations, increasing the window of opportunity for attackers. Additionally, if exploited in a chained attack, it could facilitate lateral movement or privilege escalation within networks. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge.

Mitigation Recommendations

1. Immediately update Wireshark to the latest patched versions once they are officially released by the Wireshark Foundation. Monitor official channels for patch announcements. 2. Until patches are applied, avoid opening capture files from untrusted or unknown sources. Implement strict policies for handling and sharing capture files within the organization. 3. Employ network segmentation and endpoint security controls to limit exposure of systems running Wireshark to potentially malicious files. 4. Use sandboxing or isolated environments for analyzing untrusted capture files to contain potential crashes or exploits. 5. Educate security analysts and network administrators about the risk and ensure they verify the provenance of capture files before opening. 6. Monitor security advisories and threat intelligence feeds for any emerging exploit code targeting this vulnerability. 7. Consider application whitelisting and enhanced logging on systems running Wireshark to detect anomalous behavior related to this vulnerability. 8. Integrate vulnerability management processes to track and remediate Wireshark vulnerabilities promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-11-16T11:30:45.732Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092638fe7723195e0b631c

Added to database: 11/3/2025, 10:01:28 PM

Last enriched: 11/3/2025, 10:15:31 PM

Last updated: 11/4/2025, 1:00:09 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats