Vulnerability Name: | CVE-2006-3628 (CCN-27822) | ||||||||||||||||||||
Assigned: | 2006-07-17 | ||||||||||||||||||||
Published: | 2006-07-17 | ||||||||||||||||||||
Updated: | 2018-10-18 | ||||||||||||||||||||
Summary: | Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-134 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: SGI Type: UNKNOWN 20060801-01-P Source: MITRE Type: CNA CVE-2006-3628 Source: CCN Type: RHSA-2006-0602 wireshark security update (was ethereal) Source: REDHAT Type: UNKNOWN RHSA-2006:0602 Source: CCN Type: SA21078 Wireshark Multiple Protocol Dissector Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 21078 Source: SECUNIA Type: Patch, Vendor Advisory 21107 Source: SECUNIA Type: Vendor Advisory 21121 Source: SECUNIA Type: Vendor Advisory 21204 Source: SECUNIA Type: Vendor Advisory 21249 Source: SECUNIA Type: Vendor Advisory 21467 Source: SECUNIA Type: Vendor Advisory 21488 Source: SECUNIA Type: Vendor Advisory 21598 Source: CCN Type: SA22089 Avaya Products wireshark Vulnerabilities Source: SECUNIA Type: Vendor Advisory 22089 Source: GENTOO Type: UNKNOWN GLSA-200607-09 Source: CCN Type: SECTRACK ID: 1016532 Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1016532 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2006-197.htm Source: CCN Type: ASA-2006-197 wireshark security update (was ethereal) (RHSA-2006-0602) Source: DEBIAN Type: UNKNOWN DSA-1127 Source: DEBIAN Type: DSA-1127 ethereal -- several vulnerabilities Source: CCN Type: GLSA-200607-09 Wireshark: Multiple vulnerabilities Source: MANDRIVA Type: UNKNOWN MDKSA-2006:128 Source: SUSE Type: UNKNOWN SUSE-SR:2006:020 Source: OSVDB Type: UNKNOWN 27362 Source: OSVDB Type: UNKNOWN 27363 Source: OSVDB Type: UNKNOWN 27364 Source: OSVDB Type: UNKNOWN 27369 Source: CCN Type: OSVDB ID: 27362 Wireshark Checkpoint FW-1 Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27363 Wireshark MQ Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27364 Wireshark XML Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27369 Wireshark NTP Dissector Format String Flaw Source: BUGTRAQ Type: UNKNOWN 20060719 rPSA-2006-0132-1 tshark wireshark Source: BID Type: Patch 19051 Source: CCN Type: BID-19051 Wireshark Protocol Dissectors Multiple Vulnerabilities Source: VUPEN Type: Vendor Advisory ADV-2006-2850 Source: CCN Type: Wireshark Security Advisory wnpa-sec-2006-01 Multiple problems in Ethereal® versions 0.8.14 to 0.10.10 Source: CONFIRM Type: Patch http://www.wireshark.org/security/wnpa-sec-2006-01.html Source: XF Type: UNKNOWN wireshark-ansimap-format-string(27822) Source: XF Type: UNKNOWN wireshark-ansimap-format-string(27822) Source: XF Type: UNKNOWN wireshark-cpfw1-format-string(27823) Source: XF Type: UNKNOWN wireshark-mq-format-string(27824) Source: XF Type: UNKNOWN wireshark-xml-format-string(27825) Source: XF Type: UNKNOWN wireshark-ntp-format-string(27828) Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-512 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9175 Source: SUSE Type: SUSE-SR:2006:020 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||||||
Vulnerability Name: | CVE-2006-3628 (CCN-27823) | ||||||||||||||||||||
Assigned: | 2006-07-17 | ||||||||||||||||||||
Published: | 2006-07-17 | ||||||||||||||||||||
Updated: | 2006-07-17 | ||||||||||||||||||||
Summary: | Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2006-3628 Source: CCN Type: RHSA-2006-0602 wireshark security update (was ethereal) Source: CCN Type: SA21078 Wireshark Multiple Protocol Dissector Vulnerabilities Source: CCN Type: SA22089 Avaya Products wireshark Vulnerabilities Source: CCN Type: SECTRACK ID: 1016532 Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code Source: CCN Type: ASA-2006-197 wireshark security update (was ethereal) (RHSA-2006-0602) Source: DEBIAN Type: DSA-1127 ethereal -- several vulnerabilities Source: CCN Type: GLSA-200607-09 Wireshark: Multiple vulnerabilities Source: CCN Type: OSVDB ID: 27362 Wireshark Checkpoint FW-1 Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27363 Wireshark MQ Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27364 Wireshark XML Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27369 Wireshark NTP Dissector Format String Flaw Source: CCN Type: BID-19051 Wireshark Protocol Dissectors Multiple Vulnerabilities Source: CCN Type: Wireshark Security Advisory wnpa-sec-2006-01 Multiple problems in Ethereal® versions 0.8.14 to 0.10.10 Source: XF Type: UNKNOWN wireshark-cpfw1-format-string(27823) Source: SUSE Type: SUSE-SR:2006:020 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Vulnerability Name: | CVE-2006-3628 (CCN-27824) | ||||||||||||||||||||
Assigned: | 2006-07-17 | ||||||||||||||||||||
Published: | 2006-07-17 | ||||||||||||||||||||
Updated: | 2018-10-18 | ||||||||||||||||||||
Summary: | Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-134 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2006-3628 Source: CCN Type: RHSA-2006-0602 wireshark security update (was ethereal) Source: CCN Type: SA21078 Wireshark Multiple Protocol Dissector Vulnerabilities Source: CCN Type: SA22089 Avaya Products wireshark Vulnerabilities Source: CCN Type: SECTRACK ID: 1016532 Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code Source: CCN Type: ASA-2006-197 wireshark security update (was ethereal) (RHSA-2006-0602) Source: DEBIAN Type: DSA-1127 ethereal -- several vulnerabilities Source: CCN Type: GLSA-200607-09 Wireshark: Multiple vulnerabilities Source: CCN Type: OSVDB ID: 27362 Wireshark Checkpoint FW-1 Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27363 Wireshark MQ Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27364 Wireshark XML Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27369 Wireshark NTP Dissector Format String Flaw Source: CCN Type: BID-19051 Wireshark Protocol Dissectors Multiple Vulnerabilities Source: CCN Type: Wireshark Security Advisory wnpa-sec-2006-01 Multiple problems in Ethereal® versions 0.8.14 to 0.10.10 Source: XF Type: UNKNOWN wireshark-mq-format-string(27824) Source: SUSE Type: SUSE-SR:2006:020 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Vulnerability Name: | CVE-2006-3628 (CCN-27825) | ||||||||||||||||||||
Assigned: | 2006-07-17 | ||||||||||||||||||||
Published: | 2006-07-17 | ||||||||||||||||||||
Updated: | 2006-07-17 | ||||||||||||||||||||
Summary: | Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2006-3628 Source: CCN Type: RHSA-2006-0602 wireshark security update (was ethereal) Source: CCN Type: SA21078 Wireshark Multiple Protocol Dissector Vulnerabilities Source: CCN Type: SA22089 Avaya Products wireshark Vulnerabilities Source: CCN Type: SECTRACK ID: 1016532 Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code Source: CCN Type: ASA-2006-197 wireshark security update (was ethereal) (RHSA-2006-0602) Source: DEBIAN Type: DSA-1127 ethereal -- several vulnerabilities Source: CCN Type: GLSA-200607-09 Wireshark: Multiple vulnerabilities Source: CCN Type: OSVDB ID: 27362 Wireshark Checkpoint FW-1 Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27363 Wireshark MQ Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27364 Wireshark XML Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27369 Wireshark NTP Dissector Format String Flaw Source: CCN Type: BID-19051 Wireshark Protocol Dissectors Multiple Vulnerabilities Source: CCN Type: Wireshark Security Advisory wnpa-sec-2006-01 Multiple problems in Ethereal® versions 0.8.14 to 0.10.10 Source: XF Type: UNKNOWN wireshark-xml-format-string(27825) Source: SUSE Type: SUSE-SR:2006:020 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Vulnerability Name: | CVE-2006-3628 (CCN-27828) | ||||||||||||||||||||
Assigned: | 2006-07-17 | ||||||||||||||||||||
Published: | 2006-07-17 | ||||||||||||||||||||
Updated: | 2006-07-17 | ||||||||||||||||||||
Summary: | Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2006-3628 Source: CCN Type: RHSA-2006-0602 wireshark security update (was ethereal) Source: CCN Type: SA21078 Wireshark Multiple Protocol Dissector Vulnerabilities Source: CCN Type: SA22089 Avaya Products wireshark Vulnerabilities Source: CCN Type: SECTRACK ID: 1016532 Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code Source: CCN Type: ASA-2006-197 wireshark security update (was ethereal) (RHSA-2006-0602) Source: DEBIAN Type: DSA-1127 ethereal -- several vulnerabilities Source: CCN Type: GLSA-200607-09 Wireshark: Multiple vulnerabilities Source: CCN Type: OSVDB ID: 27362 Wireshark Checkpoint FW-1 Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27363 Wireshark MQ Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27364 Wireshark XML Dissector Format String Flaw Source: CCN Type: OSVDB ID: 27369 Wireshark NTP Dissector Format String Flaw Source: CCN Type: BID-19051 Wireshark Protocol Dissectors Multiple Vulnerabilities Source: CCN Type: Wireshark Security Advisory wnpa-sec-2006-01 Multiple problems in Ethereal® versions 0.8.14 to 0.10.10 Source: XF Type: UNKNOWN wireshark-ntp-format-string(27828) Source: SUSE Type: SUSE-SR:2006:020 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |