First published: Tue Jun 26 2007(Updated: )
Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =0.99.0 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =0.99.1 | |
Wireshark Wireshark | =0.99.5 | |
Wireshark Wireshark | =0.99.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3389 has been classified as a denial of service vulnerability.
To fix CVE-2007-3389, you should upgrade to Wireshark version 0.99.6 or later.
CVE-2007-3389 is caused by a crafted chunked encoding in an HTTP response that leads to a crash.
Wireshark versions 0.99.0 through 0.99.5 are affected by CVE-2007-3389.
Yes, CVE-2007-3389 can be exploited remotely by attackers sending crafted HTTP responses.