5
CVSSv2

CVE-2008-4682

Published: 22/10/2008 Updated: 11/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

wtap.c in Wireshark 0.99.7 up to and including 1.0.3 allows remote malicious users to cause a denial of service (application abort) via a malformed Tamos CommView capture file (aka .ncf file) with an "unknown/unexpected packet type" that triggers a failed assertion.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 0.99.7

wireshark wireshark 0.99.8

wireshark wireshark 1.0.1

wireshark wireshark 1.0.2

wireshark wireshark 1.0

wireshark wireshark 1.0.0

wireshark wireshark 1.0.3

Vendor Advisories

Synopsis Moderate: wireshark security update Type/Severity Security Advisory: Moderate Topic Updated wireshark packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 3, 4, and 5This update has been rated as having moderate security impact by the RedHat Security Response Tea ...
Debian Bug report logs - #503589 wireshark: CVE-2008-46[80-85] multiple security issues Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Sun, 26 Oct 2008 20:12:01 UTC Severit ...

Exploits

Wireshark 10x ncf local denial of service author: Shinnok Description Wireshark 10x crashes as a result of a failed assertion when dealing with a malformed Tamosoft CommView ncf packet capture: Err file wtapc: line 620 (wtap_read): assertion failed: (wth->phdrpkt_encap != WTAP_ENCAP_PER_PACKET) githubcom/offensive-security/ex ...