Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-3146

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2008-3146
Last Modified 15 Mar 2011 12:00:00
Published 02 Sep 2008 10:24:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-3146

Summary

Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.

Vulnerable Systems

Application

  • Wireshark 0.9.7

  • Wireshark 0.9.8

  • Wireshark 0.99

  • Wireshark 0.99.0

  • Wireshark 0.99.1

  • Wireshark 0.99.2

  • Wireshark 0.99.3

  • Wireshark 0.99.4

  • Wireshark 0.99.5

  • Wireshark 0.99.6

  • Wireshark 0.99.6a

  • Wireshark 0.99.7

  • Wireshark 0.99.8

  • Wireshark 1.0

  • Wireshark 1.0.0

  • Wireshark 1.0.1

  • Wireshark 1.0.2


References

FEDORA - FEDORA-2008-7894

FEDORA - FEDORA-2008-7936

CONFIRM - http://www.wireshark.org/security/wnpa-sec-2008-05.html

VUPEN - ADV-2008-2773

SECTRACK - 1020819

BUGTRAQ - 20080917 rPSA-2008-0278-1 tshark wireshark

REDHAT - RHSA-2008:0890

MANDRIVA - MDVSA-2008:199

CONFIRM - http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0278

CONFIRM - http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm

GENTOO - GLSA-200809-17

SECUNIA - 32091

SECUNIA - 32028

SECUNIA - 31886

SECUNIA - 31864

SECUNIA - 31687

SUSE - SUSE-SR:2008:017

CONFIRM - http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2675

Related Patches

Novell SUSE 2008:5520 ethereal security update for SLE 10 i586


Last Updated: 27 May 2016 10:48:05