Vulnerability Name:

CVE-2006-3632 (CCN-27830)

Assigned:2006-07-17
Published:2006-07-17
Updated:2018-10-18
Summary:Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: SGI
Type: UNKNOWN
20060801-01-P

Source: MITRE
Type: CNA
CVE-2006-3632

Source: CCN
Type: RHSA-2006-0602
wireshark security update (was ethereal)

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0602

Source: CCN
Type: SA21078
Wireshark Multiple Protocol Dissector Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
21078

Source: SECUNIA
Type: Vendor Advisory
21107

Source: SECUNIA
Type: Vendor Advisory
21121

Source: SECUNIA
Type: Vendor Advisory
21204

Source: SECUNIA
Type: Vendor Advisory
21249

Source: SECUNIA
Type: Vendor Advisory
21467

Source: SECUNIA
Type: Vendor Advisory
21488

Source: SECUNIA
Type: Vendor Advisory
21598

Source: CCN
Type: SA22089
Avaya Products wireshark Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
22089

Source: GENTOO
Type: UNKNOWN
GLSA-200607-09

Source: CCN
Type: SECTRACK ID: 1016532
Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1016532

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-197.htm

Source: CCN
Type: ASA-2006-197
wireshark security update (was ethereal) (RHSA-2006-0602)

Source: DEBIAN
Type: UNKNOWN
DSA-1127

Source: DEBIAN
Type: DSA-1127
ethereal -- several vulnerabilities

Source: CCN
Type: GLSA-200607-09
Wireshark: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:128

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:020

Source: OSVDB
Type: UNKNOWN
27371

Source: CCN
Type: OSVDB ID: 27371
Wireshark NFS Dissector Unspecified Remote Overflow

Source: BUGTRAQ
Type: UNKNOWN
20060719 rPSA-2006-0132-1 tshark wireshark

Source: BID
Type: UNKNOWN
19051

Source: CCN
Type: BID-19051
Wireshark Protocol Dissectors Multiple Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2006-2850

Source: CCN
Type: Wireshark Security Advisory wnpa-sec-2006-01
Multiple problems in Ethereal® versions 0.8.14 to 0.10.10

Source: CONFIRM
Type: Patch
http://www.wireshark.org/security/wnpa-sec-2006-01.html

Source: XF
Type: UNKNOWN
wireshark-nfs-bo(27830)

Source: XF
Type: UNKNOWN
wireshark-nfs-bo(27830)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-512

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9468

Source: SUSE
Type: SUSE-SR:2006:020
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ethereal_group:ethereal:0.8.16:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.17:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.17a:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.20:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.0a:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.14:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.99.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20063632
    V
    CVE-2006-3632
    2015-11-16
    oval:org.mitre.oval:def:9468
    V
    Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector.
    2013-04-29
    oval:com.redhat.rhsa:def:20060602
    P
    RHSA-2006:0602: wireshark security update (was ethereal) (Moderate)
    2006-08-16
    oval:org.debian:def:1127
    V
    several vulnerabilities
    2006-07-28
    BACK
    ethereal_group ethereal 0.8.16
    ethereal_group ethereal 0.8.17
    ethereal_group ethereal 0.8.17a
    ethereal_group ethereal 0.8.18
    ethereal_group ethereal 0.8.19
    ethereal_group ethereal 0.8.20
    ethereal_group ethereal 0.9.0
    ethereal_group ethereal 0.9.1
    ethereal_group ethereal 0.9.2
    ethereal_group ethereal 0.9.3
    ethereal_group ethereal 0.9.4
    ethereal_group ethereal 0.9.5
    ethereal_group ethereal 0.9.6
    ethereal_group ethereal 0.9.7
    ethereal_group ethereal 0.9.8
    ethereal_group ethereal 0.9.9
    ethereal_group ethereal 0.9.10
    ethereal_group ethereal 0.9.11
    ethereal_group ethereal 0.9.12
    ethereal_group ethereal 0.9.13
    ethereal_group ethereal 0.9.14
    ethereal_group ethereal 0.9.15
    ethereal_group ethereal 0.9.16
    ethereal_group ethereal 0.10
    ethereal_group ethereal 0.10.0
    ethereal_group ethereal 0.10.0a
    ethereal_group ethereal 0.10.1
    ethereal_group ethereal 0.10.2
    ethereal_group ethereal 0.10.3
    ethereal_group ethereal 0.10.4
    ethereal_group ethereal 0.10.5
    ethereal_group ethereal 0.10.6
    ethereal_group ethereal 0.10.7
    ethereal_group ethereal 0.10.8
    ethereal_group ethereal 0.10.9
    ethereal_group ethereal 0.10.10
    ethereal_group ethereal 0.10.11
    ethereal_group ethereal 0.10.12
    ethereal_group ethereal 0.10.13
    ethereal_group ethereal 0.10.14
    ethereal_group ethereal 0.99.0