{"id":"CVE-2023-4513","summary":"Missing Release of Memory after Effective Lifetime in Wireshark","details":"BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file","modified":"2026-05-18T05:55:31.043468461Z","published":"2023-08-24T06:30:50.727Z","related":["SUSE-SU-2023:3778-1","openSUSE-SU-2024:13184-1"],"database_specific":{"cwe_ids":["CWE-401"],"cna_assigner":"GitLab","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/4xxx/CVE-2023-4513.json"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/02/msg00016.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2023-25.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/4xxx/CVE-2023-4513.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4513"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/19259"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"last_affected":"ac38b4d13cb67d5738982d3dfe503ca58e787c0e"},{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"last_affected":"0ad1823cc09011b4a03d9e8dba7e2fcebc936d82"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"3.6.0"},{"last_affected":"3.6.15"},{"introduced":"4.0.0"},{"last_affected":"4.0.7"}]}}],"versions":["wireshark-3.6.15","v3.6.15","wireshark-4.0.7","v4.0.7","v3.6.15rc0","v4.0.7rc0","wireshark-3.6.14","v3.6.14","wireshark-4.0.6","v4.0.6","v3.6.14rc0","v4.0.6rc0","wireshark-4.0.5","v4.0.5","wireshark-3.6.13","v3.6.13","v3.6.13rc0","v4.0.5rc0","wireshark-3.6.12","v3.6.12","wireshark-4.0.4","v4.0.4","v3.6.12rc0","v4.0.4rc0","wireshark-3.6.11","v3.6.11","wireshark-4.0.3","v4.0.3","v3.6.11rc0","v4.0.3rc0","wireshark-3.6.10","v3.6.10","wireshark-4.0.2","v4.0.2","v3.6.10rc0","v4.0.2rc0","wireshark-4.0.1","v4.0.1","wireshark-3.6.9","v3.6.9","v4.0.1rc0","wireshark-4.0.0","v4.0.0","v3.6.9rc0","wireshark-3.6.8","v3.6.8","v3.6.8rc0","wireshark-3.6.7","v3.6.7","v3.6.7rc0","wireshark-3.6.6","v3.6.6","v3.6.6rc0","wireshark-3.6.5","v3.6.5","v3.6.5rc0","wireshark-3.6.4","v3.6.4","v3.6.4rc0","wireshark-3.6.3","v3.6.3","v3.6.3rc0","wireshark-3.6.2","v3.6.2","v3.6.2rc0","wireshark-3.6.1","v3.6.1","v3.6.1rc0","wireshark-3.6.0","v3.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-4513.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"last_affected":"ac38b4d13cb67d5738982d3dfe503ca58e787c0e"},{"introduced":"0cbe09cd796b2ea24c6069b76ea16df7f51cf67b"},{"last_affected":"0ad1823cc09011b4a03d9e8dba7e2fcebc936d82"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"3.6.0"},{"last_affected":"3.6.15"},{"introduced":"4.0.0"},{"last_affected":"4.0.7"}]}}],"versions":["wireshark-3.6.15","v3.6.15","wireshark-4.0.7","v4.0.7","v3.6.15rc0","v4.0.7rc0","wireshark-3.6.14","v3.6.14","wireshark-4.0.6","v4.0.6","v3.6.14rc0","v4.0.6rc0","wireshark-4.0.5","v4.0.5","wireshark-3.6.13","v3.6.13","v3.6.13rc0","v4.0.5rc0","wireshark-3.6.12","v3.6.12","wireshark-4.0.4","v4.0.4","v3.6.12rc0","v4.0.4rc0","wireshark-3.6.11","v3.6.11","wireshark-4.0.3","v4.0.3","v3.6.11rc0","v4.0.3rc0","wireshark-3.6.10","v3.6.10","wireshark-4.0.2","v4.0.2","v3.6.10rc0","v4.0.2rc0","wireshark-4.0.1","v4.0.1","wireshark-3.6.9","v3.6.9","v4.0.1rc0","wireshark-4.0.0","v4.0.0","v3.6.9rc0","wireshark-3.6.8","v3.6.8","v3.6.8rc0","wireshark-3.6.7","v3.6.7","v3.6.7rc0","wireshark-3.6.6","v3.6.6","v3.6.6rc0","wireshark-3.6.5","v3.6.5","v3.6.5rc0","wireshark-3.6.4","v3.6.4","v3.6.4rc0","wireshark-3.6.3","v3.6.3","v3.6.3rc0","wireshark-3.6.2","v3.6.2","v3.6.2rc0","wireshark-3.6.1","v3.6.1","v3.6.1rc0","wireshark-3.6.0","v3.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-4513.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}