4.3
CVSSv2

CVE-2007-6113

Published: 23/11/2007 Updated: 15/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote malicious users to cause a denial of service (long loop) via a malformed DNP3 packet.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 0.10.2

wireshark wireshark 0.10.3

wireshark wireshark 0.9.14

wireshark wireshark 0.99.6

wireshark wireshark 0.10.12

wireshark wireshark 0.99.5

wireshark wireshark 0.99.4

wireshark wireshark 0.7.9

wireshark wireshark 0.99.2

wireshark wireshark 0.10.6

wireshark wireshark 0.10.7

wireshark wireshark 0.10.14

wireshark wireshark 0.9.15

wireshark wireshark 0.9.8

wireshark wireshark 0.9.5

wireshark wireshark 0.99

wireshark wireshark 0.8.20

wireshark wireshark 0.10.4

wireshark wireshark 0.10.5

wireshark wireshark 0.6

wireshark wireshark 0.10.13

wireshark wireshark 0.99.3

wireshark wireshark 0.9.2

wireshark wireshark 0.99.1

wireshark wireshark 0.99.0

wireshark wireshark 0.10.8

wireshark wireshark 0.10.9

wireshark wireshark 0.9.6

wireshark wireshark 0.9.7

wireshark wireshark 0.9.10

wireshark wireshark 0.8.16

wireshark wireshark 0.8.19

Vendor Advisories

Debian Bug report logs - #452381 wireshark: multiple security issues CVE-2007-6111 - CVE-2007-6121 Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 22 Nov 2007 12:33:03 U ...

Exploits

#!/usr/bin/perl # Automatically generated by beSTORM(tm) # Copyright Beyond Security (c) 2003-2007 ($Revision: 3741 $) # Attack vector: # M0:P0:B0BT0:B0BT0:B0BT0:B0BT0 # Module: # DNP3 use strict; use warnings; use Getopt::Std; use IO::Socket::INET; $SIG{INT} = \&abort; my $host = '192168452'; my $port = 20000; my $proto = 'udp'; m ...

References

CWE-189http://www.wireshark.org/security/wnpa-sec-2007-03.htmlhttp://www.securityfocus.com/bid/26532http://securitytracker.com/id?1018988http://secunia.com/advisories/27777http://www.securiteam.com/securitynews/5LP0V00MAI.htmlhttp://bugs.gentoo.org/show_bug.cgi?id=199958https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.htmlhttp://security.gentoo.org/glsa/glsa-200712-23.xmlhttp://www.securitytracker.com/id?1018635http://secunia.com/advisories/28197http://secunia.com/advisories/28288http://securityreason.com/securityalert/3095http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004http://www.mandriva.com/security/advisories?name=MDVSA-2008:001http://secunia.com/advisories/28304https://issues.rpath.com/browse/RPL-1975https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:1http://www.redhat.com/support/errata/RHSA-2008-0058.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0059.htmlhttp://secunia.com/advisories/28207http://secunia.com/advisories/28325http://secunia.com/advisories/28564http://secunia.com/advisories/28583http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.htmlhttp://secunia.com/advisories/29048http://www.vupen.com/english/advisories/2007/3956https://exchange.xforce.ibmcloud.com/vulnerabilities/36392https://www.exploit-db.com/exploits/4347https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9841http://www.securityfocus.com/archive/1/485792/100/0/threadedhttp://www.securityfocus.com/archive/1/478497/100/0/threadedhttp://tools.cisco.com/security/center/viewAlert.x?alertId=14616https://nvd.nist.govhttps://www.exploit-db.com/exploits/4347/