Vulnerability Name:

CVE-2009-2560 (CCN-51934)

Assigned:2009-07-20
Published:2009-07-20
Updated:2017-09-19
Summary:Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector.
Note: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
2.9 Low (REDHAT CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P)
2.1 Low (REDHAT Temporal CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2009-2560

Source: CCN
Type: RHSA-2010-0360
Moderate: wireshark security update

Source: CCN
Type: SA35884
Wireshark Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
35884

Source: CCN
Type: SA37175
Wireshark Denial of Service Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
37175

Source: SECUNIA
Type: Vendor Advisory
37409

Source: SECUNIA
Type: Vendor Advisory
37477

Source: CCN
Type: SA39714
Avaya Products Wireshark Multiple Vulnerabilities

Source: DEBIAN
Type: UNKNOWN
DSA-1942

Source: DEBIAN
Type: DSA-1942
wireshark -- several vulnerabilities

Source: CCN
Type: GLSA-200909-16
Wireshark: Denial of Service

Source: CCN
Type: GLSA-200911-05
Wireshark: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2009:194

Source: MLIST
Type: UNKNOWN
[oss-security] 20090722 Re: CVE request: Wireshark <1.2.1 Multiple DoS

Source: BID
Type: Patch
35748

Source: CCN
Type: BID-35748
Wireshark 1.2.0 Multiple Vulnerabilities

Source: BID
Type: UNKNOWN
36846

Source: CCN
Type: BID-36846
Wireshark 1.2.2 and 1.0.9 Multiple Vulnerabilities

Source: VUPEN
Type: Vendor Advisory
ADV-2009-1970

Source: VUPEN
Type: Vendor Advisory
ADV-2009-3061

Source: CONFIRM
Type: UNKNOWN
http://www.wireshark.org/docs/relnotes/wireshark-1.0.10.html

Source: CCN
Type: wnpa-sec-2009-04
Multiple vulnerabilities in Wireshark version 0.9.2 to 1.2.0

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.wireshark.org/security/wnpa-sec-2009-04.html

Source: CONFIRM
Type: UNKNOWN
http://www.wireshark.org/security/wnpa-sec-2009-08.html

Source: XF
Type: UNKNOWN
wireshark-bluetooth-dos(51934)

Source: XF
Type: UNKNOWN
wireshark-radius-dissector-dos(54019)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10403

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:6416

Source: CCN
Type: ASA-2010-116
wireshark security update (RHSA-2010-0360)

Source: SUSE
Type: SUSE-SR:2009:020
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:sip_enablement_services:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2009-2560 (CCN-51935)

    Assigned:2009-07-20
    Published:2009-07-20
    Updated:2009-07-20
    Summary:Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector.
    Note: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    2.9 Low (REDHAT CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P)
    2.1 Low (REDHAT Temporal CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-2009-2560

    Source: CCN
    Type: RHSA-2010-0360
    Moderate: wireshark security update

    Source: CCN
    Type: SA35884
    Wireshark Multiple Vulnerabilities

    Source: CCN
    Type: SA37175
    Wireshark Denial of Service Vulnerabilities

    Source: CCN
    Type: SA39714
    Avaya Products Wireshark Multiple Vulnerabilities

    Source: DEBIAN
    Type: DSA-1942
    wireshark -- several vulnerabilities

    Source: CCN
    Type: GLSA-200909-16
    Wireshark: Denial of Service

    Source: CCN
    Type: GLSA-200911-05
    Wireshark: Multiple vulnerabilities

    Source: CCN
    Type: BID-35748
    Wireshark 1.2.0 Multiple Vulnerabilities

    Source: CCN
    Type: BID-36846
    Wireshark 1.2.2 and 1.0.9 Multiple Vulnerabilities

    Source: CCN
    Type: wnpa-sec-2009-04
    Multiple vulnerabilities in Wireshark version 0.9.2 to 1.2.0

    Source: XF
    Type: UNKNOWN
    wireshark-radius-dos(51935)

    Source: CCN
    Type: ASA-2010-116
    wireshark security update (RHSA-2010-0360)

    Source: SUSE
    Type: SUSE-SR:2009:020
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*
  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:sip_enablement_services:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2009-2560 (CCN-51936)

    Assigned:2009-07-20
    Published:2009-07-20
    Updated:2017-09-19
    Summary:Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector.
    Note: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    2.9 Low (REDHAT CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P)
    2.1 Low (REDHAT Temporal CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-noinfo
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-2009-2560

    Source: CCN
    Type: RHSA-2010-0360
    Moderate: wireshark security update

    Source: CCN
    Type: SA35884
    Wireshark Multiple Vulnerabilities

    Source: CCN
    Type: SA37175
    Wireshark Denial of Service Vulnerabilities

    Source: CCN
    Type: SA39714
    Avaya Products Wireshark Multiple Vulnerabilities

    Source: DEBIAN
    Type: DSA-1942
    wireshark -- several vulnerabilities

    Source: CCN
    Type: GLSA-200909-16
    Wireshark: Denial of Service

    Source: CCN
    Type: GLSA-200911-05
    Wireshark: Multiple vulnerabilities

    Source: CCN
    Type: BID-35748
    Wireshark 1.2.0 Multiple Vulnerabilities

    Source: CCN
    Type: BID-36846
    Wireshark 1.2.2 and 1.0.9 Multiple Vulnerabilities

    Source: CCN
    Type: wnpa-sec-2009-04
    Multiple vulnerabilities in Wireshark version 0.9.2 to 1.2.0

    Source: XF
    Type: UNKNOWN
    wireshark-miop-dos(51936)

    Source: CCN
    Type: ASA-2010-116
    wireshark security update (RHSA-2010-0360)

    Source: SUSE
    Type: SUSE-SR:2009:020
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*
  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2009-2560 (CCN-54019)

    Assigned:2009-07-20
    Published:2009-07-20
    Updated:2009-10-26
    Summary:Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector.
    Note: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    2.9 Low (REDHAT CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P)
    2.1 Low (REDHAT Temporal CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-2009-2560

    Source: CCN
    Type: RHSA-2010-0360
    Moderate: wireshark security update

    Source: CCN
    Type: SA35884
    Wireshark Multiple Vulnerabilities

    Source: CCN
    Type: SA37175
    Wireshark Denial of Service Vulnerabilities

    Source: CCN
    Type: SA39714
    Avaya Products Wireshark Multiple Vulnerabilities

    Source: DEBIAN
    Type: DSA-1942
    wireshark -- several vulnerabilities

    Source: CCN
    Type: GLSA-200911-05
    Wireshark: Multiple vulnerabilities

    Source: CCN
    Type: BID-35748
    Wireshark 1.2.0 Multiple Vulnerabilities

    Source: CCN
    Type: BID-36846
    Wireshark 1.2.2 and 1.0.9 Multiple Vulnerabilities

    Source: CCN
    Type: wnpa-sec-2009-08
    Multiple vulnerabilities in Wireshark® version 0.10.10 to 1.0.9

    Source: XF
    Type: UNKNOWN
    wireshark-radius-dissector-dos(54019)

    Source: CCN
    Type: ASA-2010-116
    wireshark security update (RHSA-2010-0360)

    Source: SUSE
    Type: SUSE-SR:2009:020
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*
  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:sip_enablement_services:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20092560
    V
    CVE-2009-2560
    2022-05-20
    oval:org.opensuse.security:def:31335
    P
    Security update for xorg-x11-server (Important)
    2021-12-20
    oval:org.opensuse.security:def:32242
    P
    Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)
    2021-12-14
    oval:org.opensuse.security:def:32237
    P
    Security update for glib-networking (Important)
    2021-12-13
    oval:org.opensuse.security:def:26182
    P
    Security update for MozillaFirefox (Important)
    2021-12-12
    oval:org.opensuse.security:def:31320
    P
    Security update for MozillaFirefox (Important)
    2021-12-12
    oval:org.opensuse.security:def:42248
    P
    Security update for the Linux RT Kernel (Important)
    2021-12-09
    oval:org.opensuse.security:def:31308
    P
    Security update for postgresql96 (Important)
    2021-11-22
    oval:org.opensuse.security:def:31309
    P
    Security update for postgresql10 (Important)
    2021-11-22
    oval:org.opensuse.security:def:26167
    P
    Security update for php72 (Moderate)
    2021-11-19
    oval:org.opensuse.security:def:26156
    P
    Security update for open-lldp (Moderate)
    2021-10-26
    oval:org.opensuse.security:def:33019
    P
    Security update for apache2 (Important)
    2021-10-06
    oval:org.opensuse.security:def:26141
    P
    Security update for webkit2gtk3 (Important)
    2021-10-06
    oval:org.opensuse.security:def:32188
    P
    Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)
    2021-09-23
    oval:org.opensuse.security:def:26130
    P
    Security update for ghostscript (Critical)
    2021-09-21
    oval:org.opensuse.security:def:26129
    P
    Security update for gtk-vnc (Moderate)
    2021-09-16
    oval:org.opensuse.security:def:26123
    P
    Security update for openssl-1_0_0 (Low)
    2021-09-09
    oval:org.opensuse.security:def:31675
    P
    Security update for bind (Moderate)
    2021-08-30
    oval:org.opensuse.security:def:26109
    P
    Security update for unrar (Moderate)
    2021-08-25
    oval:org.opensuse.security:def:32980
    P
    Security update for spice-vdagent (Moderate)
    2021-08-17
    oval:org.opensuse.security:def:32155
    P
    Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)
    2021-07-27
    oval:org.opensuse.security:def:32132
    P
    Security update for libnettle (Important)
    2021-06-23
    oval:org.opensuse.security:def:32128
    P
    Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP3) (Important)
    2021-06-18
    oval:org.opensuse.security:def:31203
    P
    Security update for apache2 (Important)
    2021-06-17
    oval:org.opensuse.security:def:36322
    P
    wireshark-1.10.13-0.2.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:36580
    P
    wireshark-1.10.13-0.2.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:42729
    P
    wireshark-1.10.13-0.2.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:26070
    P
    Security update for spice (Important)
    2021-06-08
    oval:org.opensuse.security:def:31618
    P
    Security update for avahi (Important)
    2021-06-03
    oval:org.opensuse.security:def:32084
    P
    Security update for gdm (Important)
    2021-04-28
    oval:org.opensuse.security:def:31608
    P
    Security update for xen (Important)
    2021-04-19
    oval:org.opensuse.security:def:32062
    P
    Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) (Important)
    2021-04-07
    oval:org.opensuse.security:def:42056
    P
    Security update for curl (Moderate)
    2021-04-01
    oval:org.opensuse.security:def:26213
    P
    Security update for evolution-data-server (Moderate)
    2021-03-19
    oval:org.opensuse.security:def:32276
    P
    Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)
    2021-03-17
    oval:org.opensuse.security:def:31740
    P
    Security update for the Linux Kernel (Important)
    2021-03-09
    oval:org.opensuse.security:def:26205
    P
    Security update for openssl-1_0_0 (Moderate)
    2021-03-08
    oval:org.opensuse.security:def:31727
    P
    Security update for wpa_supplicant (Important)
    2021-02-15
    oval:org.opensuse.security:def:26075
    P
    Security update for ImageMagick (Important)
    2021-01-22
    oval:org.opensuse.security:def:26031
    P
    Security update for php74 (Moderate)
    2021-01-14
    oval:org.opensuse.security:def:32098
    P
    Security update for dovecot22 (Important)
    2021-01-04
    oval:org.opensuse.security:def:25976
    P
    Security update for curl (Moderate)
    2020-12-10
    oval:org.opensuse.security:def:32006
    P
    Security update for mutt (Important)
    2020-12-07
    oval:org.opensuse.security:def:36056
    P
    wireshark-1.8.6-0.2.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:42463
    P
    wireshark-1.8.6-0.2.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35649
    P
    wireshark-1.0.5-1.34.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35841
    P
    wireshark-1.4.10-0.2.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:25872
    P
    Security update for ImageMagick (Important)
    2020-12-01
    oval:org.opensuse.security:def:26337
    P
    Security update for freexl (Low)
    2020-12-01
    oval:org.opensuse.security:def:31117
    P
    Security update for krb5 (Important)
    2020-12-01
    oval:org.opensuse.security:def:25595
    P
    Security update for java-1_8_0-ibm (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31976
    P
    Security update for jasper (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26847
    P
    yast2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26649
    P
    wireshark on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25947
    P
    Security update for freerdp (Important)
    2020-12-01
    oval:org.opensuse.security:def:25626
    P
    Security update for libqt5-qtbase (Important)
    2020-12-01
    oval:org.opensuse.security:def:32023
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:27019
    P
    python on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31129
    P
    Security update for kvm (Important)
    2020-12-01
    oval:org.opensuse.security:def:25733
    P
    Security update for mgetty (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26905
    P
    glibc on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31523
    P
    Security update for rsync (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25830
    P
    Security update for libimobiledevice, usbmuxd (Important)
    2020-12-01
    oval:org.opensuse.security:def:25201
    P
    Security update for java-1_8_0-openjdk (Important)
    2020-12-01
    oval:org.opensuse.security:def:32542
    P
    kvm on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27578
    P
    wireshark on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25605
    P
    Security update for MozillaFirefox (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26555
    P
    glib2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32766
    P
    pcsc-ccid on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25276
    P
    Security update for openssl-1_1 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26284
    P
    Security update for taglib (Low)
    2020-12-01
    oval:org.opensuse.security:def:32608
    P
    systemtap on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25617
    P
    Security update for jasper (Low)
    2020-12-01
    oval:org.opensuse.security:def:31832
    P
    Security update for bind (Important)
    2020-12-01
    oval:org.opensuse.security:def:26759
    P
    libpng12-0 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25485
    P
    Security update for cups (Important)
    2020-12-01
    oval:org.opensuse.security:def:31918
    P
    Security update for gd (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26603
    P
    libsnmp15-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33285
    P
    wireshark on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25809
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:31871
    P
    Security update for curl (Important)
    2020-12-01
    oval:org.opensuse.security:def:26840
    P
    wireshark on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25817
    P
    Security update for pidgin-otr (Important)
    2020-12-01
    oval:org.opensuse.security:def:27285
    P
    rsync on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32454
    P
    Security update for xorg-x11-libICE (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31937
    P
    Security update for glibc (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31789
    P
    Security update for MozillaFirefox (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26414
    P
    Security update for python-Django (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26021
    P
    Security update for libreoffice (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32298
    P
    Security update for puppet (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25392
    P
    Security update for samba (Important)
    2020-12-01
    oval:org.opensuse.security:def:31526
    P
    Security update for rsyslog (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26448
    P
    Security update for phpMyAdmin (Important)
    2020-12-01
    oval:org.opensuse.security:def:25932
    P
    Security update for gstreamer-plugins-base (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32614
    P
    wireshark on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25871
    P
    Security update for gd (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31874
    P
    Security update for cyrus-imapd (Important)
    2020-12-01
    oval:org.opensuse.security:def:31571
    P
    Security update for strongswan (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26323
    P
    Security update for chromium (Important)
    2020-12-01
    oval:org.opensuse.security:def:25467
    P
    Security update for ucode-intel (Important)
    2020-12-01
    oval:org.opensuse.security:def:31889
    P
    Security update for evince (Important)
    2020-12-01
    oval:org.opensuse.security:def:26550
    P
    fuse on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26614
    P
    mozilla-xulrunner190 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25883
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:31783
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:26381
    P
    Security update for ffmpeg (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31118
    P
    Security update for krb5 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25676
    P
    Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26861
    P
    ant on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31522
    P
    Security update for rsync (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25777
    P
    Security update for flash-player (Critical)
    2020-12-01
    oval:org.opensuse.security:def:27054
    P
    wireshark on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25200
    P
    Security update for java-1_8_0-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:32503
    P
    e2fsprogs on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27543
    P
    python-crypto on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31534
    P
    Security update for samba (Important)
    2020-12-01
    oval:org.opensuse.security:def:26471
    P
    Security update for Mozilla Thunderbird (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25879
    P
    Security update for pidgin-otr (Important)
    2020-12-01
    oval:org.opensuse.security:def:25212
    P
    Security update for squid (Important)
    2020-12-01
    oval:org.opensuse.security:def:31427
    P
    Security update for php53 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26235
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32564
    P
    libpython2_6-1_0 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25606
    P
    Security update for libjpeg-turbo (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26706
    P
    ghostscript-fonts-other on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32805
    P
    wireshark on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25404
    P
    Security update for spice (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31762
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:26589
    P
    libltdl7 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33246
    P
    pyxml on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25681
    P
    Security update for xen (Important)
    2020-12-01
    oval:org.opensuse.security:def:26808
    P
    postgresql on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26805
    P
    perl-Tk on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25542
    P
    Security update for java-1_8_0-openjdk (Important)
    2020-12-01
    oval:org.opensuse.security:def:31974
    P
    Security update for jasper (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26647
    P
    w3m on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25890
    P
    Security update for php5 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32398
    P
    Security update for unzip (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31893
    P
    Security update for expat (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31788
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:26333
    P
    Security update for redis (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25968
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27320
    P
    wireshark on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25391
    P
    Security update for ovmf (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31394
    P
    Security update for patch (Important)
    2020-12-01
    oval:org.opensuse.security:def:26297
    P
    Security update for libvpx (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25918
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:32575
    P
    log4net on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31800
    P
    Security update for SuSEfirewall2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31484
    P
    Security update for python (Important)
    2020-12-01
    oval:org.opensuse.security:def:32342
    P
    Security update for spice (Important)
    2020-12-01
    oval:org.opensuse.security:def:25403
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:26501
    P
    Security update for chromium (Important)
    2020-12-01
    oval:org.mitre.oval:def:13282
    P
    DSA-1942-1 wireshark -- several
    2014-06-23
    oval:org.mitre.oval:def:7586
    P
    DSA-1942 wireshark -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:22891
    P
    ELSA-2010:0360: wireshark security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:21253
    P
    RHSA-2010:0360: wireshark security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:6416
    V
    Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause DOS.
    2013-08-19
    oval:org.mitre.oval:def:10403
    V
    Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector. NOTE: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
    2013-04-29
    oval:com.redhat.rhsa:def:20100360
    P
    RHSA-2010:0360: wireshark security update (Moderate)
    2010-04-20
    oval:org.debian:def:1942
    V
    several vulnerabilities
    2009-11-29
    BACK
    wireshark wireshark 1.0.0
    wireshark wireshark 1.0.1
    wireshark wireshark 1.0.2
    wireshark wireshark 1.0.3
    wireshark wireshark 1.0.4
    wireshark wireshark 1.0.5
    wireshark wireshark 1.0.6
    wireshark wireshark 1.0.7
    wireshark wireshark 1.0.8
    wireshark wireshark 1.0.9
    wireshark wireshark 1.2.0
    wireshark wireshark 1.2.0
    gentoo linux *
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    debian debian linux 4.0
    redhat enterprise linux 5
    avaya communication manager 2.0
    avaya communication manager 4.0
    avaya sip enablement services *
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    mandriva enterprise server 5
    mandriva enterprise server 5
    wireshark wireshark 1.2.0
    gentoo linux *
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    debian debian linux 4.0
    redhat enterprise linux 5
    avaya communication manager 2.0
    avaya communication manager 4.0
    avaya sip enablement services *
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    mandriva enterprise server 5
    mandriva enterprise server 5
    wireshark wireshark 1.0.1
    wireshark wireshark 0.10.13
    wireshark wireshark 1.0.2
    wireshark wireshark 1.0.3
    wireshark wireshark 1.0.4
    wireshark wireshark 1.0.5
    wireshark wireshark 1.0.6
    wireshark wireshark 1.0
    wireshark wireshark 1.0.7
    wireshark wireshark 1.0.8
    wireshark wireshark 1.2.0
    wireshark wireshark 1.0.9
    gentoo linux *
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    debian debian linux 4.0
    redhat enterprise linux 5
    avaya communication manager 2.0
    avaya communication manager 4.0
    avaya sip enablement services *
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    mandriva enterprise server 5
    mandriva enterprise server 5