First published: Fri Oct 27 2006(Updated: )
epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.9.10 | |
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =0.10.4 | |
Wireshark Wireshark | =0.10 | |
Wireshark Wireshark | =0.9.8 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =0.99.1 | |
Wireshark Wireshark | =0.10.13 | |
Wireshark Wireshark | =0.99 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4805 has a severity level categorized as a denial of service vulnerability.
To fix CVE-2006-4805, update to a version of Wireshark that is not vulnerable, specifically versions later than 0.99.3.
CVE-2006-4805 affects Wireshark versions from 0.9.8 to 0.99.3.
The impact of CVE-2006-4805 is the potential for memory consumption and crashes of the Wireshark application.
Yes, CVE-2006-4805 can be exploited remotely by attackers through specially encoded XOT packets.