ID CVE-2007-0459
Summary packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets.
References
Vulnerable Configurations
  • cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-10-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
  • accepted 2013-04-29T04:05:54.169-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets.
    family unix
    id oval:org.mitre.oval:def:10465
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets.
    version 30
  • accepted 2013-08-19T04:00:41.551-04:00
    class vulnerability
    contributors
    • name Shane Shaffer
      organization G2, Inc.
    • name Shane Shaffer
      organization G2, Inc.
    • name Shane Shaffer
      organization G2, Inc.
    definition_extensions
    comment Wireshark is installed on the system.
    oval oval:org.mitre.oval:def:6589
    description packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets.
    family windows
    id oval:org.mitre.oval:def:14875
    status accepted
    submitted 2012-02-27T15:34:33.178-04:00
    title TCP dissector vulnerability in Wireshark 0.99.2 to 0.99.4
    version 8
redhat via4
advisories
bugzilla
id 227140
title CVE-2007-0456 Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459)
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • comment wireshark is earlier than 0:0.99.5-EL4.1
          oval oval:com.redhat.rhsa:tst:20070066001
        • comment wireshark is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060602002
      • AND
        • comment wireshark-gnome is earlier than 0:0.99.5-EL4.1
          oval oval:com.redhat.rhsa:tst:20070066003
        • comment wireshark-gnome is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060602004
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • comment wireshark is earlier than 0:0.99.5-1.el5
          oval oval:com.redhat.rhsa:tst:20070066006
        • comment wireshark is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070066007
      • AND
        • comment wireshark-gnome is earlier than 0:0.99.5-1.el5
          oval oval:com.redhat.rhsa:tst:20070066008
        • comment wireshark-gnome is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070066009
rhsa
id RHSA-2007:0066
released 2007-03-14
severity Low
title RHSA-2007:0066: wireshark security update (Low)
rpms
  • wireshark-0:0.99.5-1.el5
  • wireshark-0:0.99.5-AS21.3
  • wireshark-0:0.99.5-EL3.1
  • wireshark-0:0.99.5-EL4.1
  • wireshark-debuginfo-0:0.99.5-1.el5
  • wireshark-debuginfo-0:0.99.5-EL3.1
  • wireshark-debuginfo-0:0.99.5-EL4.1
  • wireshark-gnome-0:0.99.5-1.el5
  • wireshark-gnome-0:0.99.5-AS21.3
  • wireshark-gnome-0:0.99.5-EL3.1
  • wireshark-gnome-0:0.99.5-EL4.1
refmap via4
bid 22352
confirm
fedora FEDORA-2007-207
mandriva MDKSA-2007:033
misc http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1200
sectrack 1017581
secunia
  • 24011
  • 24016
  • 24025
  • 24084
  • 24515
  • 24650
  • 24970
sgi 20070301-01-P
vupen ADV-2007-0443
xf wireshark-tcpdissector-dos(32053)
Last major update 11-10-2017 - 01:31
Published 02-02-2007 - 20:28
Last modified 11-10-2017 - 01:31
Back to Top