First published: Wed Oct 22 2008(Updated: )
wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application abort) via a malformed Tamos CommView capture file (aka .ncf file) with an "unknown/unexpected packet type" that triggers a failed assertion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.8 | |
Wireshark Wireshark | =1.0.1 | |
Wireshark Wireshark | =1.0 | |
Wireshark Wireshark | =1.0.2 | |
Wireshark Wireshark | =1.0.3 | |
Wireshark Wireshark | =1.0.0 | |
Wireshark Wireshark | =0.99.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4682 has a severity rating that indicates it can allow remote attackers to cause a denial of service in the affected Wireshark versions.
To fix CVE-2008-4682, upgrade to a Wireshark version that is later than 1.0.3 or 0.99.8 to ensure the vulnerability is patched.
CVE-2008-4682 affects Wireshark versions 0.99.7 through 1.0.3.
CVE-2008-4682 is classified as a denial of service vulnerability triggered by malformed Tamos CommView capture files.
CVE-2008-4682 can primarily be exploited by remote attackers through the use of specially crafted .ncf files.