5
CVSSv2

CVE-2007-6117

Published: 23/11/2007 Updated: 15/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 0.99.1

wireshark wireshark 0.99.2

wireshark wireshark 0.99.3

wireshark wireshark 0.99.4

wireshark wireshark 0.99.5

wireshark wireshark 0.99.6

wireshark wireshark 0.99

wireshark wireshark 0.99.0

wireshark wireshark 0.10.14

Vendor Advisories

Debian Bug report logs - #452381 wireshark: multiple security issues CVE-2007-6111 - CVE-2007-6121 Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 22 Nov 2007 12:33:03 U ...
Several remote vulnerabilities have been discovered in the Wireshark network traffic analyzer, which may lead to denial of service or execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6114 Stefan Esser discovered a buffer overflow in the SSL dissector Fabiodds discove ...

References

NVD-CWE-noinfohttp://www.wireshark.org/security/wnpa-sec-2007-03.htmlhttp://www.securityfocus.com/bid/26532http://securitytracker.com/id?1018988http://secunia.com/advisories/27777http://www.debian.org/security/2007/dsa-1414http://secunia.com/advisories/27817http://bugs.gentoo.org/show_bug.cgi?id=199958https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.htmlhttp://security.gentoo.org/glsa/glsa-200712-23.xmlhttp://secunia.com/advisories/28197http://secunia.com/advisories/28288http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004http://www.mandriva.com/security/advisories?name=MDVSA-2008:001http://secunia.com/advisories/28304https://issues.rpath.com/browse/RPL-1975http://www.wireshark.org/docs/relnotes/wireshark-0.99.7.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=397331https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:1http://www.redhat.com/support/errata/RHSA-2008-0058.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0059.htmlhttp://secunia.com/advisories/28207http://secunia.com/advisories/28325http://secunia.com/advisories/28564http://secunia.com/advisories/28583http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.htmlhttp://secunia.com/advisories/29048http://www.vupen.com/english/advisories/2007/3956https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11508http://www.securityfocus.com/archive/1/485792/100/0/threadedhttps://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381https://www.debian.org/security/./dsa-1414