CVE-2024-2955: CWE-762: Mismatched Memory Management Routines in Wireshark Foundation Wireshark
T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file
AI Analysis
Technical Summary
CVE-2024-2955 is a vulnerability identified in the Wireshark network protocol analyzer, specifically within the T.38 protocol dissector. The root cause is a mismatched memory management routine (CWE-762), which typically involves improper handling of memory allocation and deallocation, leading to memory corruption. This flaw affects Wireshark versions 4.0.0 through 4.0.13 and 4.2.0. An attacker can exploit this vulnerability by injecting specially crafted T.38 packets or by providing a maliciously crafted capture file to Wireshark. When Wireshark processes this malformed data, it triggers a crash, resulting in a denial of service condition. The CVSS v3.1 score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and requiring user interaction (UI:R). The impact covers confidentiality, integrity, and availability, as memory corruption could potentially be leveraged for further exploitation beyond DoS, though no such exploits are known currently. The vulnerability is particularly relevant for network analysts and security professionals who routinely open capture files or analyze network traffic using Wireshark. Since Wireshark is widely used for network troubleshooting and security monitoring, this vulnerability poses a risk to operational continuity and data security if exploited.
Potential Impact
For European organizations, the primary impact is a denial of service on systems running vulnerable versions of Wireshark, which could disrupt network monitoring and incident response activities. This disruption can delay detection of other security incidents or degrade network troubleshooting capabilities. In critical infrastructure sectors such as telecommunications, finance, and government, where Wireshark is commonly used for packet analysis, such outages could have cascading effects on operational security and compliance. Additionally, the memory corruption nature of the vulnerability could theoretically allow an attacker to execute arbitrary code or escalate privileges if combined with other vulnerabilities, though no such exploits are currently known. Organizations relying on Wireshark for forensic analysis or real-time network monitoring may face increased risk of data loss or compromised integrity of captured data. The requirement for user interaction and local access limits remote exploitation but does not eliminate risk from insider threats or malicious files received via email or removable media.
Mitigation Recommendations
1. Upgrade Wireshark immediately to a patched version once available; monitor Wireshark Foundation advisories for updates. 2. Until patches are released, restrict Wireshark usage to trusted personnel and environments. 3. Avoid opening capture files from untrusted or unknown sources to prevent triggering the vulnerability. 4. Implement strict network segmentation and access controls to limit exposure of systems running Wireshark. 5. Use endpoint protection solutions to detect and block suspicious file activity related to capture files. 6. Educate users on the risks of opening unverified capture files and enforce policies for handling network data. 7. Monitor Wireshark application logs and system stability for signs of crashes or abnormal behavior that could indicate exploitation attempts. 8. Consider deploying alternative packet analysis tools temporarily if patching is delayed and risk is high. 9. Conduct regular vulnerability assessments and penetration testing focused on network analysis tools to identify similar risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium
CVE-2024-2955: CWE-762: Mismatched Memory Management Routines in Wireshark Foundation Wireshark
Description
T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file
AI-Powered Analysis
Technical Analysis
CVE-2024-2955 is a vulnerability identified in the Wireshark network protocol analyzer, specifically within the T.38 protocol dissector. The root cause is a mismatched memory management routine (CWE-762), which typically involves improper handling of memory allocation and deallocation, leading to memory corruption. This flaw affects Wireshark versions 4.0.0 through 4.0.13 and 4.2.0. An attacker can exploit this vulnerability by injecting specially crafted T.38 packets or by providing a maliciously crafted capture file to Wireshark. When Wireshark processes this malformed data, it triggers a crash, resulting in a denial of service condition. The CVSS v3.1 score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and requiring user interaction (UI:R). The impact covers confidentiality, integrity, and availability, as memory corruption could potentially be leveraged for further exploitation beyond DoS, though no such exploits are known currently. The vulnerability is particularly relevant for network analysts and security professionals who routinely open capture files or analyze network traffic using Wireshark. Since Wireshark is widely used for network troubleshooting and security monitoring, this vulnerability poses a risk to operational continuity and data security if exploited.
Potential Impact
For European organizations, the primary impact is a denial of service on systems running vulnerable versions of Wireshark, which could disrupt network monitoring and incident response activities. This disruption can delay detection of other security incidents or degrade network troubleshooting capabilities. In critical infrastructure sectors such as telecommunications, finance, and government, where Wireshark is commonly used for packet analysis, such outages could have cascading effects on operational security and compliance. Additionally, the memory corruption nature of the vulnerability could theoretically allow an attacker to execute arbitrary code or escalate privileges if combined with other vulnerabilities, though no such exploits are currently known. Organizations relying on Wireshark for forensic analysis or real-time network monitoring may face increased risk of data loss or compromised integrity of captured data. The requirement for user interaction and local access limits remote exploitation but does not eliminate risk from insider threats or malicious files received via email or removable media.
Mitigation Recommendations
1. Upgrade Wireshark immediately to a patched version once available; monitor Wireshark Foundation advisories for updates. 2. Until patches are released, restrict Wireshark usage to trusted personnel and environments. 3. Avoid opening capture files from untrusted or unknown sources to prevent triggering the vulnerability. 4. Implement strict network segmentation and access controls to limit exposure of systems running Wireshark. 5. Use endpoint protection solutions to detect and block suspicious file activity related to capture files. 6. Educate users on the risks of opening unverified capture files and enforce policies for handling network data. 7. Monitor Wireshark application logs and system stability for signs of crashes or abnormal behavior that could indicate exploitation attempts. 8. Consider deploying alternative packet analysis tools temporarily if patching is delayed and risk is high. 9. Conduct regular vulnerability assessments and penetration testing focused on network analysis tools to identify similar risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2024-03-26T19:02:07.653Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092623fe7723195e0b4728
Added to database: 11/3/2025, 10:01:07 PM
Last enriched: 11/3/2025, 11:59:03 PM
Last updated: 12/17/2025, 10:14:19 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68401: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
MediumCVE-2025-68275: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
CriticalCVE-2025-68399: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
LowCVE-2025-68112: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
CriticalCVE-2025-68111: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.