{"id":59854,"date":"2025-08-03T18:43:44","date_gmt":"2025-08-03T18:43:44","guid":{"rendered":""},"modified":"2025-10-15T16:37:17","modified_gmt":"2025-10-15T22:37:17","slug":"cve-2025-5601-denial-of-service-vulnerability-in-wireshark-4-4-0-to-4-4-6-and-4-2-0-to-4-2-12","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-5601-denial-of-service-vulnerability-in-wireshark-4-4-0-to-4-4-6-and-4-2-0-to-4-2-12\/","title":{"rendered":"<strong>CVE-2025-5601: Denial of Service Vulnerability in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The CVE-2025-5601 is a significant vulnerability that affects Wireshark versions 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12. Wireshark, a widely used network protocol analyzer, is crucial for network troubleshoot, analysis, software and communication protocol development, and education. The vulnerability lies in the column handling crashes, which allows denial of <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52809-php-remote-file-inclusion-vulnerability-in-national-weather-service-alerts\/\"  data-wpil-monitor-id=\"65938\">service via packet injection or a crafted capture file<\/a>. This poses a severe threat to organizations and systems relying on these versions of Wireshark, as it can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31278-memory-corruption-vulnerability-with-potential-system-compromise\/\"  data-wpil-monitor-id=\"70413\">potentially compromise systems<\/a> and lead to data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-5601<br \/>\nSeverity: High (7.8)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Denial of Service, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43192-critical-configuration-issue-in-macos-allowing-potential-system-compromise\/\"  data-wpil-monitor-id=\"71720\">Potential system<\/a> compromise, and data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-2474549165\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Wireshark | 4.4.0 to 4.4.6<br \/>\nWireshark | 4.2.0 to 4.2.12<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43193-critical-memory-handling-vulnerability-in-macos\/\"  data-wpil-monitor-id=\"71719\">vulnerability stems from the column handling<\/a> in Wireshark. An attacker can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54444-unrestricted-file-upload-leading-to-code-injection-in-samsung-electronics-magicinfo-9-server\/\"  data-wpil-monitor-id=\"68406\">inject a specially crafted packet or capture file<\/a> which causes a system crash when processed by the affected versions of Wireshark. The crash results in a denial of service, but in some cases, it might also <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7837-critical-vulnerability-in-totolink-t6-potentially-leading-to-system-compromise\/\"  data-wpil-monitor-id=\"71721\">lead to potential system<\/a> compromise or data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1924170344\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here&#8217;s a conceptual example of how an attacker might exploit this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7097-critical-command-injection-vulnerability-in-comodo-internet-security-premium\/\"  data-wpil-monitor-id=\"68405\">vulnerability by injecting<\/a> a malicious packet:<\/p>\n<pre><code class=\"\" data-line=\"\"># The attacker crafts a malicious packet\necho -e &quot;\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00&quot; &gt; malicious_packet.bin\n# The attacker injects the malicious packet into the network stream\ncat malicious_packet.bin | nc target.example.com 443<\/code><\/pre>\n<p>In this example, the attacker crafts a malicious packet (`malicious_packet.bin`) and <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-12913-sql-injection-vulnerability-in-megatek-communication-system-azora-wireless-network-management\/\"  data-wpil-monitor-id=\"89991\">injects it into the network<\/a> stream using netcat (`nc`). When this packet is processed by the affected versions of Wireshark, it triggers the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-33077-local-stack-based-buffer-overflow-vulnerability-in-ibm-engineering-systems-design-rhapsody\/\"  data-wpil-monitor-id=\"68404\">vulnerability and causes a system<\/a> crash, leading to a denial of service.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The CVE-2025-5601 is a significant vulnerability that affects Wireshark versions 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12. Wireshark, a widely used network protocol analyzer, is crucial for network troubleshoot, analysis, software and communication protocol development, and education. The vulnerability lies in the column handling crashes, which allows denial of service via packet injection or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[87],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59854","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-dos"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59854"}],"version-history":[{"count":5,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59854\/revisions"}],"predecessor-version":[{"id":82868,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59854\/revisions\/82868"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59854"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59854"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59854"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59854"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59854"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59854"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}