Secunia - Stay Secure
Did you know...
Home Corporate Website Jobs Mailing Lists RSS Blog Advertise
Solutions For
  Security Professionals
  Security Vendors

Free Solutions For
  Open Communities
  Journalists & Media

Software Inspectors
  Scan Online
  Personal (PSI) Get it
  Network (NSI)

Secunia Advisories
  Search
  Historic Advisories
  Listed By Product
  Listed By Vendor
  Statistics / Graphs
  Secunia Research
  Report Vulnerability
  About Advisories

Virus Information
  Chronological List
  Last 10 Virus Alerts
  About Virus Information

Secunia Customers
  Customer Area


Wireshark Multiple Denial of Service Vulnerabilities

Secunia Advisory: SA29156  
Release Date: 2008-02-28

Critical:
Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch

Software:Wireshark (formerly Ethereal) 0.x

Want to know the next time vulnerabilities are fixed in this product?
- Companies can be alerted via email and SMS!


Description:
Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerabilities are caused due to errors in the SCTP, SNMP, and TFTP dissectors. These can be exploited to cause the application to crash or consume large amounts of memory when processing specially crafted packets that are either captured off the wire or loaded via a capture file.

The vulnerabilities are reported in various versions prior to 0.99.8.

Do you have this product installed on your home computer? Scan using the free Personal Software Inspector. Check if a vulnerable version is installed on computers in your corporate network, scan using the Network Software Inspector.

Solution:
Update to version 0.99.8.
http://www.wireshark.org/download.html

Provided and/or discovered by:
SCTP and SNMP dissectors:
Reported by the vendor.

TFTP dissector:
The vendor credits Noam Rathaus.

Original Advisory:
http://www.wireshark.org/security/wnpa-sec-2008-01.html



Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.

24 Related Secunia Security Advisories, displaying 10

1. Wireshark Multiple Denial of Service Vulnerabilities
2. Wireshark Multiple Denial of Service Vulnerabilities
3. Wireshark Multiple Denial of Service Vulnerabilities
4. Wireshark Multiple Denial of Service Vulnerabilities
5. Wireshark Multiple Vulnerabilities
6. Wireshark Multiple Protocol Dissector Vulnerabilities
7. Ethereal Multiple Protocol Dissector Vulnerabilities
8. Ethereal GTP Dissector Denial of Service Vulnerability
9. Ethereal OSPF Protocol Dissector Buffer Overflow Vulnerability
10. Ethereal IRC Protocol Dissector Denial of Service

Show all related advisories


Send Feedback to Secunia

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.








Secunia PSI
Scan | Patch | Track
Free Download

Secunia Poll

Have your organisation taken any extraordinary steps to remediate the Microsoft Windows URI vulnerability?


See Results   


Most Popular Advisories

1.
D-Link MPEG4 SHM (Audio) Control ActiveX Control "Url" Property Buffer Overflow
2.
IBM AIX libc "inet_network() " Off-By-One Vulnerability
3.
Drupal Multiple Script Insertion Vulnerabilities
4.
Trend Micro OfficeScan CGI Module and Policy Server Buffer Overflows
5.
Red Hat update for dbus
6.
Wireshark Multiple Denial of Service Vulnerabilities
7.
D-Bus "send_interface " Security Policy Bypass
8.
IBM AIX X Server Multiple Vulnerabilities
9.
Red Hat update for ghostscript
10.
Debian update for ghostscript





Vulnerability Management - Terms & Conditions - Copyright 2002-2008 Secunia - Compliance - Contact Secunia