5
CVSSv2

CVE-2007-6120

Published: 23/11/2007 Updated: 15/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote malicious users to cause a denial of service (infinite loop) via unknown vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 0.99

wireshark wireshark 0.99.6

wireshark wireshark 0.99.0

wireshark wireshark 0.99.1

wireshark wireshark 0.99.4

wireshark wireshark 0.99.5

wireshark wireshark 0.99.2

wireshark wireshark 0.99.3

ethereal group ethereal 0.10.14

ethereal group ethereal 0.10.2

ethereal group ethereal 0.8.16

ethereal group ethereal 0.8.17

ethereal group ethereal 0.9.11

ethereal group ethereal 0.9.12

ethereal group ethereal 0.9.4

ethereal group ethereal 0.9.5

ethereal group ethereal 0.10

ethereal group ethereal 0.10.1

ethereal group ethereal 0.10.3

ethereal group ethereal 0.10.4

ethereal group ethereal 0.8.18

ethereal group ethereal 0.8.19

ethereal group ethereal 0.9.13

ethereal group ethereal 0.9.14

ethereal group ethereal 0.9.6

ethereal group ethereal 0.9.7

ethereal group ethereal 0.10.12

ethereal group ethereal 0.10.13

ethereal group ethereal 0.10.7

ethereal group ethereal 0.10.8

ethereal group ethereal 0.10.9

ethereal group ethereal 0.9.1

ethereal group ethereal 0.9.10

ethereal group ethereal 0.9.2

ethereal group ethereal 0.9.3

ethereal group ethereal 0.10.10

ethereal group ethereal 0.10.11

ethereal group ethereal 0.10.5

ethereal group ethereal 0.10.6

ethereal group ethereal 0.8.5

ethereal group ethereal 0.9

ethereal group ethereal 0.9.15

ethereal group ethereal 0.9.16

ethereal group ethereal 0.9.8

ethereal group ethereal 0.9.9

Vendor Advisories

Debian Bug report logs - #452381 wireshark: multiple security issues CVE-2007-6111 - CVE-2007-6121 Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 22 Nov 2007 12:33:03 U ...
Several remote vulnerabilities have been discovered in the Wireshark network traffic analyzer, which may lead to denial of service or execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6114 Stefan Esser discovered a buffer overflow in the SSL dissector Fabiodds discove ...

References

CWE-119http://www.wireshark.org/security/wnpa-sec-2007-03.htmlhttp://www.securityfocus.com/bid/26532http://securitytracker.com/id?1018988http://secunia.com/advisories/27777http://www.debian.org/security/2007/dsa-1414http://secunia.com/advisories/27817http://bugs.gentoo.org/show_bug.cgi?id=199958https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.htmlhttp://security.gentoo.org/glsa/glsa-200712-23.xmlhttp://secunia.com/advisories/28197http://secunia.com/advisories/28288http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004http://www.mandriva.com/security/advisories?name=MDVSA-2008:001http://secunia.com/advisories/28304https://issues.rpath.com/browse/RPL-1975https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:1http://www.redhat.com/support/errata/RHSA-2008-0058.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0059.htmlhttp://secunia.com/advisories/28207http://secunia.com/advisories/28325http://secunia.com/advisories/28564http://secunia.com/advisories/28583http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.htmlhttp://secunia.com/advisories/29048http://www.vupen.com/english/advisories/2007/3956https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9488https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14802http://www.securityfocus.com/archive/1/485792/100/0/threadedhttps://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381https://www.debian.org/security/./dsa-1414