10
CVSSv2

CVE-2008-3146

Published: 02/09/2008 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 up to and including 1.0.2 allow malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 0.9.7

wireshark wireshark 0.9.8

wireshark wireshark 0.99.5

wireshark wireshark 0.99.6

wireshark wireshark 1.0.2

wireshark wireshark 0.99.3

wireshark wireshark 0.99.4

wireshark wireshark 1.0.0

wireshark wireshark 1.0.1

wireshark wireshark 0.99

wireshark wireshark 0.99.0

wireshark wireshark 0.99.6a

wireshark wireshark 0.99.8

wireshark wireshark 1.0

wireshark wireshark 0.99.2

wireshark wireshark 0.99.1

wireshark wireshark 0.99.7

Vendor Advisories

Debian Bug report logs - #497878 wireshark: several security issues Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Fri, 5 Sep 2008 03:36:02 UTC Severity: ...
Synopsis Moderate: wireshark security update Type/Severity Security Advisory: Moderate Topic Updated wireshark packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 3, 4, and 5This update has been rated as having moderate security impact by the RedHat Security Response Tea ...