CVE-2021-39929

7.5 HIGH

📋 TL;DR

This vulnerability allows denial of service attacks against Wireshark through uncontrolled recursion in the Bluetooth DHT dissector. Attackers can crash Wireshark by injecting malicious packets or providing crafted capture files. Users running affected Wireshark versions 3.4.0-3.4.9 or 3.2.0-3.2.17 are vulnerable.

💻 Affected Systems

Products:
  • Wireshark
Versions: 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17
Operating Systems: All platforms running affected Wireshark versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the Bluetooth DHT dissector; any configuration using this dissector is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Wireshark crashes repeatedly, preventing network analysis and potentially causing data loss if analyzing critical captures during an incident.

🟠

Likely Case

Wireshark crashes when processing malicious Bluetooth traffic or specially crafted capture files, disrupting network analysis workflows.

🟢

If Mitigated

With proper network segmentation and updated software, impact is limited to isolated analysis systems with minimal operational disruption.

🌐 Internet-Facing: LOW - Wireshark is typically not internet-facing; it's a network analysis tool used internally.
🏢 Internal Only: MEDIUM - Attackers on the local network could inject malicious Bluetooth packets to crash Wireshark instances, disrupting network analysis activities.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malicious Bluetooth packets to the network or providing crafted capture files; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Wireshark 3.4.10 and 3.2.18

Vendor Advisory: https://gitlab.com/wireshark/wireshark/-/issues/17651

Restart Required: Yes

Instructions:

1. Download latest Wireshark from wireshark.org 2. Install over existing version 3. Restart system or at least Wireshark processes

🔧 Temporary Workarounds

Disable Bluetooth DHT dissector

all

Prevent Wireshark from using the vulnerable dissector

wireshark -o bluetooth.dht.enable_dissector:FALSE

Network segmentation

all

Isolate Wireshark systems from untrusted networks

🧯 If You Can't Patch

  • Restrict Wireshark usage to trusted networks only
  • Monitor for abnormal Wireshark crashes and investigate source

🔍 How to Verify

Check if Vulnerable:

Check Wireshark version: if between 3.4.0-3.4.9 or 3.2.0-3.2.17, you are vulnerable

Check Version:

wireshark -v | head -1

Verify Fix Applied:

Verify Wireshark version is 3.4.10+ or 3.2.18+

📡 Detection & Monitoring

Log Indicators:

  • Multiple Wireshark crashes in system logs
  • Segmentation fault errors from Wireshark processes

Network Indicators:

  • Unusual Bluetooth packet patterns targeting analysis systems
  • Malformed Bluetooth DHT packets

SIEM Query:

source="system_logs" AND process="wireshark" AND (event="segmentation fault" OR event="crash")

🔗 References

📤 Share & Export