First published: Fri Jul 21 2006(Updated: )
Unspecified vulnerability in the SSH dissector in Wireshark (aka Ethereal) 0.9.10 to 0.99.0 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.9.10 | |
Wireshark Wireshark | =0.9.2 | |
Wireshark Wireshark | =0.9.14 | |
Wireshark Wireshark | =0.99.0 | |
Wireshark Wireshark | =0.9.8 | |
Wireshark Wireshark | =0.9.5 | |
Wireshark Wireshark | =0.9.6 | |
Wireshark Wireshark | =0.99 | |
Wireshark Wireshark | =0.9.15 | |
Wireshark Wireshark | =0.9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3631 has been classified as a denial of service vulnerability.
To fix CVE-2006-3631, upgrade Wireshark to a version newer than 0.99.0 or apply the available patches.
CVE-2006-3631 affects Wireshark versions from 0.9.10 to 0.99.0.
CVE-2006-3631 can be exploited by remote attackers to cause an infinite loop, resulting in denial of service.
Currently, the best approach is to upgrade to a non-vulnerable version of Wireshark.