First published: Wed Dec 19 2007(Updated: )
Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =0.9.14 | |
Wireshark Wireshark | =0.99.0 | |
Wireshark Wireshark | =0.9.8 | |
Wireshark Wireshark | =0.99.6 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =0.99.1 | |
Wireshark Wireshark | =0.99.5 | |
Wireshark Wireshark | =0.99.4 | |
Wireshark Wireshark | =0.99 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6451 has a high severity level due to its potential to cause a denial of service by crashing affected Wireshark versions.
To fix CVE-2007-6451, update Wireshark to version 0.99.7 or higher, which includes patches for this vulnerability.
CVE-2007-6451 affects Wireshark versions from 0.9.14 to 0.99.6.
Exploiting CVE-2007-6451 allows remote attackers to trigger excessive memory allocation, leading to a crash of the Wireshark application.
Yes, CVE-2007-6451 is considered a remote exploitation vulnerability as it can be triggered by attackers over a network.