First published: Thu Sep 04 2008(Updated: )
Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allows attackers to cause a denial of service (hang) via a crafted NCP packet that triggers an infinite loop.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.8 | |
Wireshark Wireshark | =0.10.3 | |
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =0.10.6 | |
Wireshark Wireshark | =0.99.0 | |
Wireshark Wireshark | =0.10.4 | |
Wireshark Wireshark | =1.0.1 | |
Wireshark Wireshark | =0.10.14 | |
Wireshark Wireshark | =0.9.8 | |
Wireshark Wireshark | =0.10.1 | |
Wireshark Wireshark | =0.10.9 | |
Wireshark Wireshark | =0.10.7 | |
Wireshark Wireshark | =0.10.8 | |
Wireshark Wireshark | =0.99.6 | |
Wireshark Wireshark | =1.0.2 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =0.99.1 | |
Wireshark Wireshark | =0.10.2 | |
Wireshark Wireshark | =0.10.13 | |
Wireshark Wireshark | =0.10.12 | |
Wireshark Wireshark | =0.10.10 | |
Wireshark Wireshark | =0.10.5 | |
Wireshark Wireshark | =0.99.5 | |
Wireshark Wireshark | =0.10.11 | |
Wireshark Wireshark | =0.99.4 | |
Wireshark Wireshark | =1.0.0 | |
Wireshark Wireshark | =0.99.6a | |
Wireshark Wireshark | =0.99.7 | |
Wireshark Wireshark | =0.9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3932 is classified as a denial of service vulnerability, posing a high risk to affected systems.
To mitigate CVE-2008-3932, it is recommended to upgrade Wireshark to the latest version that addresses this vulnerability.
CVE-2008-3932 affects Wireshark versions from 0.9.7 to 1.0.2.
CVE-2008-3932 allows attackers to execute a denial of service attack by sending a crafted NCP packet that causes an infinite loop.
Users of Wireshark versions 0.9.7 through 1.0.2 are impacted by CVE-2008-3932, potentially compromising their network analysis capabilities.