10
CVSSv2

CVE-2007-6114

Published: 23/11/2007 Updated: 15/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in Wireshark (formerly Ethereal) 0.99.0 up to and including 0.99.6 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via (1) the SSL dissector or (2) the iSeries (OS/400) Communication trace file parser.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 0.99

wireshark wireshark 0.99.0

wireshark wireshark 0.99.1

wireshark wireshark 0.99.2

wireshark wireshark 0.99.3

wireshark wireshark 0.99.6

wireshark wireshark 0.99.4

wireshark wireshark 0.99.5

Vendor Advisories

Debian Bug report logs - #452381 wireshark: multiple security issues CVE-2007-6111 - CVE-2007-6121 Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 22 Nov 2007 12:33:03 U ...
Several remote vulnerabilities have been discovered in the Wireshark network traffic analyzer, which may lead to denial of service or execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6114 Stefan Esser discovered a buffer overflow in the SSL dissector Fabiodds discove ...

References

CWE-119http://www.wireshark.org/security/wnpa-sec-2007-03.htmlhttp://www.securityfocus.com/bid/26532http://securitytracker.com/id?1018988http://secunia.com/advisories/27777http://www.debian.org/security/2007/dsa-1414http://secunia.com/advisories/27817http://bugs.gentoo.org/show_bug.cgi?id=199958https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.htmlhttp://security.gentoo.org/glsa/glsa-200712-23.xmlhttp://secunia.com/advisories/28197http://secunia.com/advisories/28288http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004http://www.mandriva.com/security/advisories?name=MDVSA-2008:001http://secunia.com/advisories/28304https://issues.rpath.com/browse/RPL-1975https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:1http://www.redhat.com/support/errata/RHSA-2008-0058.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0059.htmlhttp://secunia.com/advisories/28207http://secunia.com/advisories/28325http://secunia.com/advisories/28564http://secunia.com/advisories/28583http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.htmlhttp://secunia.com/advisories/29048http://www.vupen.com/english/advisories/2007/3956https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10708http://www.securityfocus.com/archive/1/485792/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381https://nvd.nist.govhttps://www.debian.org/security/./dsa-1414