{"id":"CVE-2025-5601","summary":"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark","details":"Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file","modified":"2026-04-10T04:16:11.823366Z","published":"2025-06-04T10:30:46.001Z","related":["SUSE-SU-2025:01968-1","SUSE-SU-2025:02271-1","SUSE-SU-2025:02272-1","SUSE-SU-2026:1169-1","openSUSE-SU-2025:15308-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/5xxx/CVE-2025-5601.json","cwe_ids":["CWE-120"],"cna_assigner":"GitLab"},"references":[{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2025-02.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/5xxx/CVE-2025-5601.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5601"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/20509"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"54eedfc63953c8180b5a9c60015917cce7a2548a"},{"fixed":"07769b946e98cf8f6e76a2da06363f5323dbd0ee"},{"introduced":"009a163470b581c7d3ee66d89c819cef1f9e50fe"},{"fixed":"7980339b16307b07ff84f7878e68fde07d71fc8b"}],"database_specific":{"versions":[{"introduced":"4.2.0"},{"fixed":"4.2.12"},{"introduced":"4.4.0"},{"fixed":"4.4.7"}]}}],"versions":["v4.2.0","v4.2.1","v4.2.10","v4.2.10rc0","v4.2.11","v4.2.11rc0","v4.2.12rc0","v4.2.1rc0","v4.2.2","v4.2.2rc0","v4.2.3","v4.2.3rc0","v4.2.4","v4.2.4rc0","v4.2.5","v4.2.5rc0","v4.2.6","v4.2.6rc0","v4.2.7","v4.2.7rc0","v4.2.8","v4.2.8rc0","v4.2.9","v4.2.9rc0","v4.4.0","v4.4.1","v4.4.1rc0","v4.4.2","v4.4.2rc0","v4.4.3","v4.4.3rc0","v4.4.4","v4.4.4rc0","v4.4.5","v4.4.5rc0","v4.4.6","v4.4.6rc0","v4.4.7rc0","v4.6.7rc0","wireshark-4.2.0","wireshark-4.2.1","wireshark-4.2.10","wireshark-4.2.11","wireshark-4.2.2","wireshark-4.2.3","wireshark-4.2.4","wireshark-4.2.5","wireshark-4.2.6","wireshark-4.2.7","wireshark-4.2.8","wireshark-4.2.9","wireshark-4.4.0","wireshark-4.4.1","wireshark-4.4.2","wireshark-4.4.3","wireshark-4.4.4","wireshark-4.4.5","wireshark-4.4.6"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-5601.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"009a163470b581c7d3ee66d89c819cef1f9e50fe"},{"fixed":"7980339b16307b07ff84f7878e68fde07d71fc8b"},{"introduced":"54eedfc63953c8180b5a9c60015917cce7a2548a"},{"fixed":"ef715502a09cd3a2161eecbdeb0bd356a8f5558d"}],"database_specific":{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"4.4.0"},{"fixed":"4.4.7"},{"introduced":"4.2.0"},{"fixed":"4.2.13"}]}}],"versions":["v4.2.0","v4.2.1","v4.2.10","v4.2.10rc0","v4.2.11","v4.2.11rc0","v4.2.12","v4.2.12rc0","v4.2.13rc0","v4.2.1rc0","v4.2.2","v4.2.2rc0","v4.2.3","v4.2.3rc0","v4.2.4","v4.2.4rc0","v4.2.5","v4.2.5rc0","v4.2.6","v4.2.6rc0","v4.2.7","v4.2.7rc0","v4.2.8","v4.2.8rc0","v4.2.9","v4.2.9rc0","v4.4.0","v4.4.1","v4.4.1rc0","v4.4.2","v4.4.2rc0","v4.4.3","v4.4.3rc0","v4.4.4","v4.4.4rc0","v4.4.5","v4.4.5rc0","v4.4.6","v4.4.6rc0","v4.4.7rc0","wireshark-4.2.0","wireshark-4.2.1","wireshark-4.2.10","wireshark-4.2.11","wireshark-4.2.12","wireshark-4.2.2","wireshark-4.2.3","wireshark-4.2.4","wireshark-4.2.5","wireshark-4.2.6","wireshark-4.2.7","wireshark-4.2.8","wireshark-4.2.9","wireshark-4.4.0","wireshark-4.4.1","wireshark-4.4.2","wireshark-4.4.3","wireshark-4.4.4","wireshark-4.4.5","wireshark-4.4.6"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-5601.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}