First published: Thu Jul 10 2008(Updated: )
The RTMPT dissector in Wireshark (formerly Ethereal) 0.99.8 through 1.0.0 allows remote attackers to cause a denial of service (crash) via unknown vectors. NOTE: this might be due to a use-after-free error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rpath Linux | =1 | |
Wireshark Wireshark | =0.9.5 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =0.99.4 | |
Wireshark Wireshark | =0.99.5 | |
Wireshark Wireshark | =0.99.6 | |
Wireshark Wireshark | =0.99.7 | |
Wireshark Wireshark | =0.99.8 | |
Wireshark Wireshark | =1.0 | |
Wireshark Wireshark | =1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3139 is classified as a denial of service vulnerability that can lead to crashes in affected versions of Wireshark.
To mitigate CVE-2008-3139, users should update to the latest version of Wireshark that addresses this vulnerability.
CVE-2008-3139 affects Wireshark versions from 0.99.8 to 1.0.0 inclusive.
Yes, CVE-2008-3139 can be exploited remotely by attackers to cause a denial of service.
CVE-2008-3139 might be caused by a use-after-free error in the RTMPT dissector.