Vulnerability Name: | CVE-2006-4333 (CCN-28556) | ||||||||||||||||||||
Assigned: | 2006-08-23 | ||||||||||||||||||||
Published: | 2006-08-23 | ||||||||||||||||||||
Updated: | 2018-10-17 | ||||||||||||||||||||
Summary: | The SSCOP dissector in Wireshark (formerly Ethereal) before 0.99.3 allows remote attackers to cause a denial of service (resource consumption) via malformed packets that cause the Q.2391 dissector to use excessive memory. | ||||||||||||||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 5.4 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C) 4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2006-4333 Source: CCN Type: RHSA-2006-0658 wireshark security update Source: CCN Type: SA21597 Wireshark Multiple Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 21597 Source: SECUNIA Type: UNKNOWN 21619 Source: SECUNIA Type: UNKNOWN 21649 Source: SECUNIA Type: UNKNOWN 21682 Source: SECUNIA Type: UNKNOWN 21813 Source: SECUNIA Type: UNKNOWN 21885 Source: CCN Type: SA22378 Avaya Products Wireshark Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 22378 Source: GENTOO Type: UNKNOWN GLSA-200608-26 Source: CCN Type: SECTRACK ID: 1016736 Wireshark (Ethereal) Bugs in SCSI, DHCP, and Q.2931 Dissectors Let Remote Users Execute Arbitrary Code or Deny Service Source: SECTRACK Type: Patch 1016736 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2006-227.htm Source: CCN Type: ASA-2006-227 wireshark security update (RHSA-2006-0658) Source: DEBIAN Type: UNKNOWN DSA-1171 Source: DEBIAN Type: DSA-1171 ethereal -- several vulnerabilities Source: CCN Type: GLSA-200608-26 Wireshark: Multiple vulnerabilities Source: CCN Type: US-CERT VU#696896 Wireshark SSCOP dissector fails to properly handle malformed packets Source: CERT-VN Type: US Government Resource VU#696896 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:152 Source: REDHAT Type: UNKNOWN RHSA-2006:0658 Source: BUGTRAQ Type: UNKNOWN 20060825 rPSA-2006-0158-1 tshark wireshark Source: BID Type: Patch 19690 Source: CCN Type: BID-19690 Wireshark Multiple Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2006-3370 Source: CCN Type: Wireshark Web site Wireshark: The World's Most Popular Network Protocol Analyzer Source: CCN Type: wnpa-sec-2006-02 Multiple problems in Wireshark (Ethereal®) versions 0.7.9 to 0.99.2 Source: CONFIRM Type: Patch http://www.wireshark.org/security/wnpa-sec-2006-02.html Source: XF Type: UNKNOWN wireshark-esp-offbyone(28553) Source: XF Type: UNKNOWN wireshark-sscop-dos(28556) Source: XF Type: UNKNOWN wireshark-sscop-dos(28556) Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-597 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11801 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |