First published: Thu Sep 04 2008(Updated: )
Unspecified vulnerability in Wireshark (formerly Ethereal) 0.99.6 through 1.0.2 allows attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.8 | |
Wireshark Wireshark | =1.0.1 | |
Wireshark Wireshark | =0.99.6 | |
Wireshark Wireshark | =1.0.2 | |
Wireshark Wireshark | =1.0.0 | |
Wireshark Wireshark | =0.99.6a | |
Wireshark Wireshark | =0.99.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3934 has a severity rating indicating a denial of service vulnerability which can cause application crashes.
To fix CVE-2008-3934, update your Wireshark software to a version later than 1.0.2.
Versions 0.99.6 through 1.0.2 of Wireshark are affected by CVE-2008-3934.
CVE-2008-3934 can be exploited by attackers using crafted Tektronix .rf5 files to crash the application.
The best workaround for CVE-2008-3934 is to avoid opening untrusted Tektronix .rf5 files until the software is updated.