Vulnerability Name:

CVE-2006-3628 (CCN-27822)

Assigned:2006-07-17
Published:2006-07-17
Updated:2018-10-18
Summary:Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-134
Vulnerability Consequences:Gain Access
References:Source: SGI
Type: UNKNOWN
20060801-01-P

Source: MITRE
Type: CNA
CVE-2006-3628

Source: CCN
Type: RHSA-2006-0602
wireshark security update (was ethereal)

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0602

Source: CCN
Type: SA21078
Wireshark Multiple Protocol Dissector Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
21078

Source: SECUNIA
Type: Patch, Vendor Advisory
21107

Source: SECUNIA
Type: Vendor Advisory
21121

Source: SECUNIA
Type: Vendor Advisory
21204

Source: SECUNIA
Type: Vendor Advisory
21249

Source: SECUNIA
Type: Vendor Advisory
21467

Source: SECUNIA
Type: Vendor Advisory
21488

Source: SECUNIA
Type: Vendor Advisory
21598

Source: CCN
Type: SA22089
Avaya Products wireshark Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
22089

Source: GENTOO
Type: UNKNOWN
GLSA-200607-09

Source: CCN
Type: SECTRACK ID: 1016532
Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1016532

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-197.htm

Source: CCN
Type: ASA-2006-197
wireshark security update (was ethereal) (RHSA-2006-0602)

Source: DEBIAN
Type: UNKNOWN
DSA-1127

Source: DEBIAN
Type: DSA-1127
ethereal -- several vulnerabilities

Source: CCN
Type: GLSA-200607-09
Wireshark: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:128

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:020

Source: OSVDB
Type: UNKNOWN
27362

Source: OSVDB
Type: UNKNOWN
27363

Source: OSVDB
Type: UNKNOWN
27364

Source: OSVDB
Type: UNKNOWN
27369

Source: CCN
Type: OSVDB ID: 27362
Wireshark Checkpoint FW-1 Dissector Format String Flaw

Source: CCN
Type: OSVDB ID: 27363
Wireshark MQ Dissector Format String Flaw

Source: CCN
Type: OSVDB ID: 27364
Wireshark XML Dissector Format String Flaw

Source: CCN
Type: OSVDB ID: 27369
Wireshark NTP Dissector Format String Flaw

Source: BUGTRAQ
Type: UNKNOWN
20060719 rPSA-2006-0132-1 tshark wireshark

Source: BID
Type: Patch
19051

Source: CCN
Type: BID-19051
Wireshark Protocol Dissectors Multiple Vulnerabilities

Source: VUPEN
Type: Vendor Advisory
ADV-2006-2850

Source: CCN
Type: Wireshark Security Advisory wnpa-sec-2006-01
Multiple problems in Ethereal® versions 0.8.14 to 0.10.10

Source: CONFIRM
Type: Patch
http://www.wireshark.org/security/wnpa-sec-2006-01.html

Source: XF
Type: UNKNOWN
wireshark-ansimap-format-string(27822)

Source: XF
Type: UNKNOWN
wireshark-ansimap-format-string(27822)

Source: XF
Type: UNKNOWN
wireshark-cpfw1-format-string(27823)

Source: XF
Type: UNKNOWN
wireshark-mq-format-string(27824)

Source: XF
Type: UNKNOWN
wireshark-xml-format-string(27825)

Source: XF
Type: UNKNOWN
wireshark-ntp-format-string(27828)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-512

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9175

Source: SUSE
Type: SUSE-SR:2006:020
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.0a:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.14:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.99.0:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.10:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-3628 (CCN-27823)

    Assigned:2006-07-17
    Published:2006-07-17
    Updated:2006-07-17
    Summary:Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2006-3628

    Source: CCN
    Type: RHSA-2006-0602
    wireshark security update (was ethereal)

    Source: CCN
    Type: SA21078
    Wireshark Multiple Protocol Dissector Vulnerabilities

    Source: CCN
    Type: SA22089
    Avaya Products wireshark Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1016532
    Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: ASA-2006-197
    wireshark security update (was ethereal) (RHSA-2006-0602)

    Source: DEBIAN
    Type: DSA-1127
    ethereal -- several vulnerabilities

    Source: CCN
    Type: GLSA-200607-09
    Wireshark: Multiple vulnerabilities

    Source: CCN
    Type: OSVDB ID: 27362
    Wireshark Checkpoint FW-1 Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27363
    Wireshark MQ Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27364
    Wireshark XML Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27369
    Wireshark NTP Dissector Format String Flaw

    Source: CCN
    Type: BID-19051
    Wireshark Protocol Dissectors Multiple Vulnerabilities

    Source: CCN
    Type: Wireshark Security Advisory wnpa-sec-2006-01
    Multiple problems in Ethereal® versions 0.8.14 to 0.10.10

    Source: XF
    Type: UNKNOWN
    wireshark-cpfw1-format-string(27823)

    Source: SUSE
    Type: SUSE-SR:2006:020
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-3628 (CCN-27824)

    Assigned:2006-07-17
    Published:2006-07-17
    Updated:2018-10-18
    Summary:Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-134
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2006-3628

    Source: CCN
    Type: RHSA-2006-0602
    wireshark security update (was ethereal)

    Source: CCN
    Type: SA21078
    Wireshark Multiple Protocol Dissector Vulnerabilities

    Source: CCN
    Type: SA22089
    Avaya Products wireshark Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1016532
    Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: ASA-2006-197
    wireshark security update (was ethereal) (RHSA-2006-0602)

    Source: DEBIAN
    Type: DSA-1127
    ethereal -- several vulnerabilities

    Source: CCN
    Type: GLSA-200607-09
    Wireshark: Multiple vulnerabilities

    Source: CCN
    Type: OSVDB ID: 27362
    Wireshark Checkpoint FW-1 Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27363
    Wireshark MQ Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27364
    Wireshark XML Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27369
    Wireshark NTP Dissector Format String Flaw

    Source: CCN
    Type: BID-19051
    Wireshark Protocol Dissectors Multiple Vulnerabilities

    Source: CCN
    Type: Wireshark Security Advisory wnpa-sec-2006-01
    Multiple problems in Ethereal® versions 0.8.14 to 0.10.10

    Source: XF
    Type: UNKNOWN
    wireshark-mq-format-string(27824)

    Source: SUSE
    Type: SUSE-SR:2006:020
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-3628 (CCN-27825)

    Assigned:2006-07-17
    Published:2006-07-17
    Updated:2006-07-17
    Summary:Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2006-3628

    Source: CCN
    Type: RHSA-2006-0602
    wireshark security update (was ethereal)

    Source: CCN
    Type: SA21078
    Wireshark Multiple Protocol Dissector Vulnerabilities

    Source: CCN
    Type: SA22089
    Avaya Products wireshark Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1016532
    Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: ASA-2006-197
    wireshark security update (was ethereal) (RHSA-2006-0602)

    Source: DEBIAN
    Type: DSA-1127
    ethereal -- several vulnerabilities

    Source: CCN
    Type: GLSA-200607-09
    Wireshark: Multiple vulnerabilities

    Source: CCN
    Type: OSVDB ID: 27362
    Wireshark Checkpoint FW-1 Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27363
    Wireshark MQ Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27364
    Wireshark XML Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27369
    Wireshark NTP Dissector Format String Flaw

    Source: CCN
    Type: BID-19051
    Wireshark Protocol Dissectors Multiple Vulnerabilities

    Source: CCN
    Type: Wireshark Security Advisory wnpa-sec-2006-01
    Multiple problems in Ethereal® versions 0.8.14 to 0.10.10

    Source: XF
    Type: UNKNOWN
    wireshark-xml-format-string(27825)

    Source: SUSE
    Type: SUSE-SR:2006:020
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-3628 (CCN-27828)

    Assigned:2006-07-17
    Published:2006-07-17
    Updated:2006-07-17
    Summary:Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2006-3628

    Source: CCN
    Type: RHSA-2006-0602
    wireshark security update (was ethereal)

    Source: CCN
    Type: SA21078
    Wireshark Multiple Protocol Dissector Vulnerabilities

    Source: CCN
    Type: SA22089
    Avaya Products wireshark Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1016532
    Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: ASA-2006-197
    wireshark security update (was ethereal) (RHSA-2006-0602)

    Source: DEBIAN
    Type: DSA-1127
    ethereal -- several vulnerabilities

    Source: CCN
    Type: GLSA-200607-09
    Wireshark: Multiple vulnerabilities

    Source: CCN
    Type: OSVDB ID: 27362
    Wireshark Checkpoint FW-1 Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27363
    Wireshark MQ Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27364
    Wireshark XML Dissector Format String Flaw

    Source: CCN
    Type: OSVDB ID: 27369
    Wireshark NTP Dissector Format String Flaw

    Source: CCN
    Type: BID-19051
    Wireshark Protocol Dissectors Multiple Vulnerabilities

    Source: CCN
    Type: Wireshark Security Advisory wnpa-sec-2006-01
    Multiple problems in Ethereal® versions 0.8.14 to 0.10.10

    Source: XF
    Type: UNKNOWN
    wireshark-ntp-format-string(27828)

    Source: SUSE
    Type: SUSE-SR:2006:020
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20063628
    V
    CVE-2006-3628
    2015-11-16
    oval:org.mitre.oval:def:9175
    V
    Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
    2013-04-29
    oval:com.redhat.rhsa:def:20060602
    P
    RHSA-2006:0602: wireshark security update (was ethereal) (Moderate)
    2006-08-16
    oval:org.debian:def:1127
    V
    several vulnerabilities
    2006-07-28
    BACK
    ethereal_group ethereal 0.10
    ethereal_group ethereal 0.10.0
    ethereal_group ethereal 0.10.0a
    ethereal_group ethereal 0.10.1
    ethereal_group ethereal 0.10.2
    ethereal_group ethereal 0.10.3
    ethereal_group ethereal 0.10.4
    ethereal_group ethereal 0.10.5
    ethereal_group ethereal 0.10.6
    ethereal_group ethereal 0.10.7
    ethereal_group ethereal 0.10.8
    ethereal_group ethereal 0.10.9
    ethereal_group ethereal 0.10.10
    ethereal_group ethereal 0.10.11
    ethereal_group ethereal 0.10.12
    ethereal_group ethereal 0.10.13
    ethereal_group ethereal 0.10.14
    ethereal_group ethereal 0.99.0
    wireshark wireshark 0.10
    wireshark wireshark 0.10.4
    wireshark wireshark 0.10.13
    wireshark wireshark 0.99
    wireshark wireshark 0.99.1