First published: Wed Oct 22 2008(Updated: )
packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.8 | |
Wireshark Wireshark | =1.0.1 | |
Wireshark Wireshark | =1.0 | |
Wireshark Wireshark | =1.0.2 | |
Wireshark Wireshark | =1.0.3 | |
Wireshark Wireshark | =1.0.0 | |
Wireshark Wireshark | =0.99.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4680 has a severity rating that indicates it can lead to a denial of service through a crash or abort of the application.
To fix CVE-2008-4680, you should upgrade to Wireshark version 1.0.4 or later.
CVE-2008-4680 affects Wireshark versions 0.99.7 through 1.0.3.
CVE-2008-4680 describes a remote attack that can result in a denial of service through a malformed USB Request Block.
Yes, CVE-2008-4680 can be exploited remotely by sending a specially crafted USB Request Block.