First published: Sat Oct 28 2006(Updated: )
Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.9.10 | |
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =0.10.4 | |
Wireshark Wireshark | =0.8.16 | |
Wireshark Wireshark | =0.10 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =0.99.1 | |
Wireshark Wireshark | =0.10.13 | |
Wireshark Wireshark | =0.7.9 | |
Wireshark Wireshark | =0.99 | |
Wireshark Wireshark | >=0.10.1<=0.99.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4574 is classified as a denial of service vulnerability.
To fix CVE-2006-4574, upgrade Wireshark to a version later than 0.99.3 or apply the relevant patches.
CVE-2006-4574 affects Wireshark versions from 0.10.1 through 0.99.3.
An attacker can exploit CVE-2006-4574 to cause a denial of service by triggering a crash in Wireshark.
The vulnerability in CVE-2006-4574 is caused by an off-by-one error in the MIME Multipart dissector.