First published: Wed Oct 22 2008(Updated: )
The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.8 | |
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =1.0.1 | |
Wireshark Wireshark | =1.0 | |
Wireshark Wireshark | =0.99.6 | |
Wireshark Wireshark | =1.0.2 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =1.0.3 | |
Wireshark Wireshark | =0.99.5 | |
Wireshark Wireshark | =0.99.4 | |
Wireshark Wireshark | =1.0.0 | |
Wireshark Wireshark | =0.99.6a | |
Wireshark Wireshark | =0.99.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4683 has been classified as a high severity vulnerability due to its potential to cause denial of service.
CVE-2008-4683 affects multiple versions of Wireshark, specifically between versions 0.99.2 and 1.0.3.
To fix CVE-2008-4683, you should upgrade to a version of Wireshark that is not affected, such as version 1.0.4 or later.
CVE-2008-4683 allows remote attackers to execute a denial of service attack, potentially crashing the application.
CVE-2008-4683 causes denial of service due to an error in the dissect_btacl function when handling packets with an invalid length.