
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-4511 affects the BT SDP (Bluetooth Service Discovery Protocol) dissector in Wireshark versions 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15. The vulnerability was discovered by Chenyuan Mi and disclosed on August 23, 2023. The issue allows denial of service via packet injection or crafted capture file (Wireshark Advisory).
The vulnerability stems from an infinite loop condition in the BT SDP dissector's dissectsdptype() function. When processing certain malformed packets, the code enters a loop or recursion that cannot be terminated, causing excessive CPU consumption. The issue occurs in a while loop that processes bytestogo, where the loop condition fails to properly handle certain edge cases (GitLab Issue). The vulnerability has been assigned a CVSS v3.1 base score of 7.5 HIGH by NIST NVD (NVD).
The vulnerability allows attackers to cause a denial of service condition by either injecting malformed packets into a network being monitored by Wireshark or by convincing a user to open a specially crafted capture file. When exploited, Wireshark will consume 100% CPU resources due to the infinite loop (Wireshark Advisory).
The vulnerability has been fixed in Wireshark versions 4.0.8 and 3.6.16. Users are advised to upgrade to these or later versions to mitigate the issue. Multiple Linux distributions have also released security updates to address this vulnerability, including Fedora and Debian (Fedora Update, Debian Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."