CVE-2023-2879
Wireshark vulnerability analysis and mitigation

Overview

GDSDB infinite loop vulnerability in Wireshark versions 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 was discovered, tracked as CVE-2023-2879. The vulnerability allows denial of service attacks through packet injection or crafted capture file manipulation. The issue was identified on May 24, 2023, and was fixed in versions 4.0.6 and 3.6.14 (Wireshark Advisory).

Technical details

The vulnerability is classified as an infinite loop condition (CWE-835) in the GDSDB dissector component of Wireshark. It received a CVSS v3.1 base score of 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network accessibility with low attack complexity and no required privileges or user interaction (NVD).

Impact

The primary impact of this vulnerability is the potential for denial of service attacks. When exploited, it can cause Wireshark to consume excessive CPU resources, effectively making the application unresponsive (Wireshark Advisory).

Mitigation and workarounds

The recommended mitigation is to upgrade to Wireshark versions 4.0.6, 3.6.14, or later. Multiple Linux distributions have released security updates to address this vulnerability, including Debian with version 4.0.6-1~deb12u1 and Gentoo with version 4.0.6 (Debian Advisory, Gentoo Advisory).

Additional resources


SourceThis report was generated using AI

Related Wireshark vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13946MEDIUM5.5
  • WiresharkWireshark
  • wireshark-cli
NoYesDec 03, 2025
CVE-2025-13945MEDIUM5.5
  • WiresharkWireshark
  • wireshark-devel
NoYesDec 03, 2025
CVE-2025-13674MEDIUM5.5
  • WiresharkWireshark
  • wireshark
NoYesNov 26, 2025
CVE-2025-13499MEDIUM5.5
  • WiresharkWireshark
  • cpe:2.3:a:wireshark:wireshark
NoYesNov 21, 2025
CVE-2025-11626MEDIUM5.5
  • WiresharkWireshark
  • cpe:2.3:a:wireshark:wireshark
NoYesOct 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management