Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6175: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark Foundation Wireshark

0
High
VulnerabilityCVE-2023-6175cvecve-2023-6175cwe-120
Published: Tue Mar 26 2024 (03/26/2024, 07:30:49 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file

AI-Powered Analysis

AILast updated: 11/11/2025, 01:17:43 UTC

Technical Analysis

CVE-2023-6175 is a classic buffer overflow vulnerability (CWE-120) found in the NetScreen file parser component of Wireshark versions 3.6.0 through 3.6.18 and 4.0.0 through 4.0.10. The flaw stems from a failure to properly check the size of input data before copying it into a buffer, allowing an attacker to craft a malicious capture file that, when opened by Wireshark, causes a buffer overflow. This overflow can lead to a denial of service by crashing the application, and potentially arbitrary code execution due to memory corruption, impacting confidentiality, integrity, and availability. The vulnerability requires the victim to open a specially crafted capture file, thus user interaction is necessary, but no prior privileges or authentication are required. The CVSS 3.1 score of 7.8 reflects a high severity with local attack vector, low attack complexity, no privileges required, but user interaction needed. The vulnerability affects widely used versions of Wireshark, a critical network protocol analyzer used globally for network troubleshooting, analysis, and security monitoring. No public exploits have been reported yet, but the nature of the flaw makes it a significant risk once weaponized. The lack of available patches at the time of reporting necessitates immediate attention to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security operations, as Wireshark is extensively used for packet analysis, incident response, and network troubleshooting. Exploitation could lead to denial of service of the Wireshark application, disrupting security monitoring and forensic investigations. More critically, if exploited for arbitrary code execution, attackers could gain control over the host system running Wireshark, potentially leading to data breaches, lateral movement within networks, or disruption of critical services. This is particularly concerning for sectors such as finance, telecommunications, energy, and government agencies that rely heavily on network analysis tools. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where capture files are shared or downloaded from untrusted sources. The vulnerability could also be leveraged in targeted attacks against security teams, undermining incident response capabilities.

Mitigation Recommendations

European organizations should immediately restrict the opening of capture files from untrusted or unknown sources. Network security teams should educate users about the risks of opening suspicious capture files. Until patches are released, running Wireshark in a sandboxed or isolated environment can limit the impact of potential exploitation. Monitoring and filtering incoming capture files through antivirus or sandboxing solutions can help detect malicious files. Organizations should track Wireshark Foundation advisories closely and apply updates as soon as patches become available. Additionally, implementing strict access controls on systems running Wireshark and limiting user privileges can reduce the risk of exploitation. Incident response plans should include procedures for handling potential exploitation of this vulnerability. Finally, consider alternative network analysis tools temporarily if Wireshark updates are delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-11-16T11:30:45.732Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092638fe7723195e0b631c

Added to database: 11/3/2025, 10:01:28 PM

Last enriched: 11/11/2025, 1:17:43 AM

Last updated: 12/19/2025, 9:26:53 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats