5
CVSSv2

CVE-2008-1562

Published: 31/03/2008 Updated: 11/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 545
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 up to and including 0.99.8 allows remote malicious users to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 0.99.4

wireshark wireshark 0.99.5

wireshark wireshark 0.99.8

wireshark wireshark 0.99.6

wireshark wireshark 0.99.7

wireshark wireshark 0.99.2

wireshark wireshark 0.99.3

Vendor Advisories

Synopsis Moderate: wireshark security update Type/Severity Security Advisory: Moderate Topic Updated wireshark packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 3, 4, and 5This update has been rated as having moderate security impact by the RedHat Security Response Tea ...
Debian Bug report logs - #452381 wireshark: multiple security issues CVE-2007-6111 - CVE-2007-6121 Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 22 Nov 2007 12:33:03 U ...

Exploits

source: wwwsecurityfocuscom/bid/28485/info Wireshark is prone to multiple denial-of-service vulnerabilities Exploiting these issues may allow attackers to cause crashes and deny service to legitimate users of the application Attackers may be able to leverage some of these vulnerabilities to execute arbitrary code, but this has not be ...

Metasploit Modules

Wireshark LDAP Dissector DOS

The LDAP dissector in Wireshark 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet.

msf > use auxiliary/dos/wireshark/ldap
      msf auxiliary(ldap) > show actions
            ...actions...
      msf auxiliary(ldap) > set ACTION <action-name>
      msf auxiliary(ldap) > show options
            ...show and set options...
      msf auxiliary(ldap) > run

References

CWE-20NVD-CWE-noinfohttp://www.wireshark.org/security/wnpa-sec-2008-02.htmlhttp://www.securityfocus.com/bid/28485http://secunia.com/advisories/29569http://www.securitytracker.com/id?1019728https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00140.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-April/msg00228.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.htmlhttp://secunia.com/advisories/29736http://secunia.com/advisories/29622http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138https://issues.rpath.com/browse/RPL-2418http://secunia.com/advisories/29695http://www.gentoo.org/security/en/glsa/glsa-200805-05.xmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:091http://secunia.com/advisories/29971http://secunia.com/advisories/32091http://www.redhat.com/support/errata/RHSA-2008-0890.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2008-392.htmhttp://www.vupen.com/english/advisories/2008/2773http://www.vupen.com/english/advisories/2008/1007/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41516https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9318https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14549http://www.securityfocus.com/archive/1/490487/100/0/threadedhttps://nvd.nist.govhttps://www.rapid7.com/db/modules/auxiliary/dos/wireshark/ldaphttps://www.exploit-db.com/exploits/31553/https://www.securityfocus.com/bid/28485https://access.redhat.com/errata/RHSA-2008:0890