First published: Wed Oct 22 2008(Updated: )
packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly handle exceptions thrown by post dissectors, which allows remote attackers to cause a denial of service (application crash) via a certain series of packets, as demonstrated by enabling the (1) PRP or (2) MATE post dissector.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.8 | |
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =1.0.1 | |
Wireshark Wireshark | =1.0 | |
Wireshark Wireshark | =0.99.6 | |
Wireshark Wireshark | =1.0.2 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =1.0.3 | |
Wireshark Wireshark | =0.99.5 | |
Wireshark Wireshark | =0.99.4 | |
Wireshark Wireshark | =1.0.0 | |
Wireshark Wireshark | =0.99.6a | |
Wireshark Wireshark | =0.99.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-4684 is considered critical due to the potential for denial of service attacks.
To fix CVE-2008-4684, users should upgrade to a version of Wireshark that is newer than 1.0.3.
Versions of Wireshark affected by CVE-2008-4684 include 0.99.2 through 1.0.3.
Yes, CVE-2008-4684 can be exploited by remote attackers to cause application crashes.
The impact of CVE-2008-4684 is the potential for a denial of service condition, resulting in application instability.