ID CVE-2009-2562
Summary Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
References
Vulnerable Configurations
  • cpe:2.3:a:wireshark:wireshark:0.10.9
    cpe:2.3:a:wireshark:wireshark:0.10.9
  • cpe:2.3:a:wireshark:wireshark:0.9.14
    cpe:2.3:a:wireshark:wireshark:0.9.14
  • Wireshark 0.99.6
    cpe:2.3:a:wireshark:wireshark:0.99.6
  • Wireshark 0.99.7
    cpe:2.3:a:wireshark:wireshark:0.99.7
  • Wireshark 0.99.5
    cpe:2.3:a:wireshark:wireshark:0.99.5
  • Wireshark 0.99.4
    cpe:2.3:a:wireshark:wireshark:0.99.4
  • Wireshark 0.99.3
    cpe:2.3:a:wireshark:wireshark:0.99.3
  • Wireshark 0.99.8
    cpe:2.3:a:wireshark:wireshark:0.99.8
  • cpe:2.3:a:wireshark:wireshark:0.9.8
    cpe:2.3:a:wireshark:wireshark:0.9.8
  • cpe:2.3:a:wireshark:wireshark:0.9.5
    cpe:2.3:a:wireshark:wireshark:0.9.5
  • cpe:2.3:a:wireshark:wireshark:0.9.6
    cpe:2.3:a:wireshark:wireshark:0.9.6
  • cpe:2.3:a:wireshark:wireshark:0.9.10
    cpe:2.3:a:wireshark:wireshark:0.9.10
  • Wireshark 0.99.2
    cpe:2.3:a:wireshark:wireshark:0.99.2
  • cpe:2.3:a:wireshark:wireshark:0.99.6a
    cpe:2.3:a:wireshark:wireshark:0.99.6a
  • cpe:2.3:a:wireshark:wireshark:0.99.1
    cpe:2.3:a:wireshark:wireshark:0.99.1
  • cpe:2.3:a:wireshark:wireshark:0.99.0
    cpe:2.3:a:wireshark:wireshark:0.99.0
  • cpe:2.3:a:wireshark:wireshark:0.99
    cpe:2.3:a:wireshark:wireshark:0.99
  • cpe:2.3:a:wireshark:wireshark:0.9.7
    cpe:2.3:a:wireshark:wireshark:0.9.7
  • cpe:2.3:a:wireshark:wireshark:0.9.2
    cpe:2.3:a:wireshark:wireshark:0.9.2
  • Wireshark 1.0.6
    cpe:2.3:a:wireshark:wireshark:1.0.6
  • Wireshark 1.0.1
    cpe:2.3:a:wireshark:wireshark:1.0.1
  • Wireshark 1.0.4
    cpe:2.3:a:wireshark:wireshark:1.0.4
  • Wireshark 1.0.5
    cpe:2.3:a:wireshark:wireshark:1.0.5
  • Wireshark 1.0.7
    cpe:2.3:a:wireshark:wireshark:1.0.7
  • Wireshark 1.0.8
    cpe:2.3:a:wireshark:wireshark:1.0.8
  • cpe:2.3:a:wireshark:wireshark:1.0
    cpe:2.3:a:wireshark:wireshark:1.0
  • Wireshark 1.0.2
    cpe:2.3:a:wireshark:wireshark:1.0.2
  • Wireshark 1.0.3
    cpe:2.3:a:wireshark:wireshark:1.0.3
  • Wireshark 1.0.0
    cpe:2.3:a:wireshark:wireshark:1.0.0
  • Wireshark 1.2.0
    cpe:2.3:a:wireshark:wireshark:1.2.0
CVSS
Base: 5.0 (as of 21-07-2009 - 14:03)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_12485.NASL
    description Flaws in the AFS dissector allowed attackers to crash ethereal via specially crafted network traffic have been fixed. (CVE-2009-2562)
    last seen 2019-02-21
    modified 2012-04-23
    plugin id 41321
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41321
    title SuSE9 Security Update : ethereal (YOU Patch Number 12485)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_ETHEREAL-6443.NASL
    description Flaws in the AFS dissector allowed attackers to crash ethereal via specially crafted network traffic. (CVE-2009-2562)
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 41507
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41507
    title SuSE 10 Security Update : ethereal (ZYPP Patch Number 6443)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2009-194.NASL
    description Vulnerabilities have been discovered in wireshark package, which could lead to application crash via radius, infiniband and afs dissectors (CVE-2009-2560, CVE-2009-2562, CVE-2009-2563). This update provides a fix for those vulnerabilities.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 40498
    published 2009-08-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40498
    title Mandriva Linux Security Advisory : wireshark (MDVSA-2009:194)
  • NASL family Windows
    NASL id WIRESHARK_1_0_9.NASL
    description The installed version of Wireshark or Ethereal is affected by multiple issues : - The AFS dissector could crash. (Bug 3564) - The infiniband dissector could crash on some platforms. (CVE-2009-2563) - The OpcUa dissector could use excessive CPU and memory. (Bug 3986) These vulnerabilities could result in a denial of service. A remote attacker could exploit these issues by tricking a user into opening a maliciously crafted capture file. Additionally, if Wireshark is running in promiscuous mode, one of these issues could be exploited remotely (from the same network segment).
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 41029
    published 2009-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41029
    title Wireshark / Ethereal 0.9.2 to 1.0.9 Multiple Vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_0_WIRESHARK-090818.NASL
    description Flaws in the AFS dissector allowed attackers to crash wireshark via specially crafted network traffic (CVE-2009-2562).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 40843
    published 2009-09-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40843
    title openSUSE Security Update : wireshark (wireshark-1229)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-9837.NASL
    description Update to Wireshark 1.2.2 fixing multiple security issues: http://www.wireshark.org/docs/relnotes/wireshark-1.2.2.html http://www.wireshark.org/security/wnpa-sec-2009-06.html * The OpcUa dissector could use excessive CPU and memory. (Bug 3986) Versions affected: 0.99.6 to 1.0.8, 1.2.0 to 1.2.1 * The GSM A RR dissector could crash. (Bug 3893) Versions affected: 1.2.0 to 1.2.1 * The TLS dissector could crash on some platforms. (Bug 4008) Versions affected: 1.2.0 to 1.2.1 http://www.wireshark.org/docs/relnotes/wireshark-1.2.1.html http://www.wireshark.org/security/wnpa-sec-2009-04.html * The AFS dissector could crash. (Bug 3564) Versions affected: 0.9.2 to 1.2.0 - The Infiniband dissector could crash on some platforms. Versions affected: 1.0.6 to 1.2.0 * The IPMI dissector could overrun a buffer. (Bug 3559) Versions affected: 1.2.0 * The Bluetooth L2CAP dissector could crash. (Bug 3572) Versions affected: 1.2.0 * The RADIUS dissector could crash. (Bug 3578) Versions affected: 1.2.0 * The MIOP dissector could crash. (Bug 3652) Versions affected: 1.2.0 * The sFlow dissector could use excessive CPU and memory. (Bug 3570) Versions affected: 1.2.0 (Issues from wnpa-sec-2009-04 does not affect users of Wireshark 1.2.1 packages from updates-testing.) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 42387
    published 2009-11-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=42387
    title Fedora 11 : wireshark-1.2.2-1.fc11 (2009-9837)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200909-16.NASL
    description The remote host is affected by the vulnerability described in GLSA-200909-16 (Wireshark: Denial of Service) Multiple vulnerabilities were discovered in Wireshark: A buffer overflow in the IPMI dissector related to an array index error (CVE-2009-2559). Multiple unspecified vulnerabilities in the Bluetooth L2CAP, RADIUS, and MIOP dissectors (CVE-2009-2560). An unspecified vulnerability in the sFlow dissector (CVE-2009-2561). An unspecified vulnerability in the AFS dissector (CVE-2009-2562). An unspecified vulnerability in the Infiniband dissector when running on unspecified platforms (CVE-2009-2563). Impact : A remote attacker could exploit these vulnerabilities by sending specially crafted packets on a network being monitored by Wireshark or by enticing a user to read a malformed packet trace file to cause a Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 40963
    published 2009-09-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40963
    title GLSA-200909-16 : Wireshark: Denial of Service
  • NASL family Windows
    NASL id WIRESHARK_1_2_1.NASL
    description The installed version of Wireshark or Ethereal is affected by multiple issues : - The IPMI dissector could overrun a buffer. (Bug 3559) - The AFS dissector could crash. (Bug 3564) - The Infiniband dissector could crash on some platforms. - The Bluetooth L2CAP dissector could crash. (Bug 3572) - The RADIUS dissector could crash. (Bug 3578) - The MIOP dissector could crash. (Bug 3652) - The sFlow dissector could use excessive CPU and memory. (Bug 3570) These vulnerabilities could result in a denial of service, or possibly arbitrary code execution. A remote attacker could exploit these issues by tricking a user into opening a maliciously crafted capture file. Additionally, if Wireshark is running in promiscuous mode, one of these issues could be exploited remotely (from the same network segment).
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 40335
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40335
    title Wireshark / Ethereal 0.9.2 to 1.2.0 Multiple Vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1942.NASL
    description Several remote vulnerabilities have been discovered in the Wireshark network traffic analyzer, which may lead to the execution of arbitrary code or denial of service. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2009-2560 A NULL pointer dereference was found in the RADIUS dissector. - CVE-2009-3550 A NULL pointer dereference was found in the DCERP/NT dissector. - CVE-2009-3829 An integer overflow was discovered in the ERF parser. This update also includes fixes for three minor issues (CVE-2008-1829, CVE-2009-2562, CVE-2009-3241 ), which were scheduled for the next stable point update. Also CVE-2009-1268 was fixed for Etch. Since this security update was issued prior to the release of the point update, the fixes were included.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 44807
    published 2010-02-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=44807
    title Debian DSA-1942-1 : wireshark - several vulnerabilities
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20100420_WIRESHARK_ON_SL3_X.NASL
    description An invalid pointer dereference flaw was found in the Wireshark SMB and SMB2 dissectors. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2009-4377) Several buffer overflow flaws were found in the Wireshark LWRES dissector. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2010-0304) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2009-2560, CVE-2009-2562, CVE-2009-2563, CVE-2009-3550, CVE-2009-3829) All running instances of Wireshark must be restarted for the update to take effect. Note: libsmi was added to SL4 and SL5 because it was a new dependency for wireshark and older versions of SL4 and SL5 did not have libsmi.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 60785
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60785
    title Scientific Linux Security Update : wireshark on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_WIRESHARK-090818.NASL
    description Flaws in the AFS dissector allowed attackers to crash wireshark via specially crafted network traffic (CVE-2009-2562).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 40847
    published 2009-09-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40847
    title openSUSE Security Update : wireshark (wireshark-1229)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_ETHEREAL-090818.NASL
    description Flaws in the AFS dissector allowed attackers to crash wireshark via specially crafted network traffic. (CVE-2009-2562)
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 41385
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41385
    title SuSE 11 Security Update : ethereal and wireshark (SAT Patch Number 1231)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2010-0360.NASL
    description From Red Hat Security Advisory 2010:0360 : Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. An invalid pointer dereference flaw was found in the Wireshark SMB and SMB2 dissectors. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2009-4377) Several buffer overflow flaws were found in the Wireshark LWRES dissector. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2010-0304) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2009-2560, CVE-2009-2562, CVE-2009-2563, CVE-2009-3550, CVE-2009-3829) Users of Wireshark should upgrade to these updated packages, which contain Wireshark version 1.0.11, and resolve these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2016-12-07
    plugin id 68032
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68032
    title Oracle Linux 3 / 4 / 5 : wireshark (ELSA-2010-0360)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-7998.NASL
    description Rebased to 1.2.x, fixing several security flaws, see the security advisory for details: http://www.wireshark.org/security/wnpa-sec-2009-04.html Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 43015
    published 2009-12-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43015
    title Fedora 10 : wireshark-1.2.1-1.fc10 (2009-7998)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2010-0360.NASL
    description Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. An invalid pointer dereference flaw was found in the Wireshark SMB and SMB2 dissectors. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2009-4377) Several buffer overflow flaws were found in the Wireshark LWRES dissector. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2010-0304) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2009-2560, CVE-2009-2562, CVE-2009-2563, CVE-2009-3550, CVE-2009-3829) Users of Wireshark should upgrade to these updated packages, which contain Wireshark version 1.0.11, and resolve these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 46301
    published 2010-05-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=46301
    title RHEL 3 / 4 / 5 : wireshark (RHSA-2010:0360)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_WIRESHARK-6444.NASL
    description Flaws in the AFS dissector allowed attackers to crash wireshark via specially crafted network traffic (CVE-2009-2562).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 42039
    published 2009-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=42039
    title openSUSE 10 Security Update : wireshark (wireshark-6444)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2010-0360.NASL
    description Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. An invalid pointer dereference flaw was found in the Wireshark SMB and SMB2 dissectors. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2009-4377) Several buffer overflow flaws were found in the Wireshark LWRES dissector. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2010-0304) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2009-2560, CVE-2009-2562, CVE-2009-2563, CVE-2009-3550, CVE-2009-3829) Users of Wireshark should upgrade to these updated packages, which contain Wireshark version 1.0.11, and resolve these issues. All running instances of Wireshark must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 45594
    published 2010-04-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=45594
    title CentOS 3 / 4 / 5 : wireshark (CESA-2010:0360)
oval via4
  • accepted 2013-04-29T04:15:09.444-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
    family unix
    id oval:org.mitre.oval:def:11643
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
    version 24
  • accepted 2013-08-19T04:05:00.338-04:00
    class vulnerability
    contributors
    • name Prabhu.S.A
      organization SecPod Technologies
    • name Shane Shaffer
      organization G2, Inc.
    • name Shane Shaffer
      organization G2, Inc.
    definition_extensions
    comment Wireshark is installed on the system.
    oval oval:org.mitre.oval:def:6589
    description Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
    family windows
    id oval:org.mitre.oval:def:5625
    status accepted
    submitted 2009-09-24T15:11:12
    title DOS vulnerability in the AFS dissector in Wireshark.
    version 7
redhat via4
rpms
  • wireshark-0:1.0.11-EL3.6
  • wireshark-gnome-0:1.0.11-EL3.6
  • wireshark-0:1.0.11-1.el4_8.5
  • wireshark-gnome-0:1.0.11-1.el4_8.5
  • wireshark-0:1.0.11-1.el5_5.5
  • wireshark-gnome-0:1.0.11-1.el5_5.5
refmap via4
bid 35748
confirm
debian DSA-1942
mandriva MDVSA-2009:194
misc https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3564
mlist
  • [oss-security] 20090917 Re: Wireshark - wnpa-sec-2009-05.html && wnpa-sec-2009-06.html -- CVE confirmation and CVE Request
  • [oss-security] 20090917 Wireshark - wnpa-sec-2009-05.html && wnpa-sec-2009-06.html -- CVE confirmation and CVE Request
secunia
  • 35884
  • 37477
vupen ADV-2009-1970
statements via4
contributor Tomas Hoger
lastmodified 2010-04-20
organization Red Hat
statement The affected version of Wireshark as shipped in Red Hat Enterprise Linux 3, 4, and 5 were fixed via: https://rhn.redhat.com/errata/RHSA-2010-0360.html
Last major update 01-09-2011 - 00:00
Published 21-07-2009 - 13:30
Last modified 18-09-2017 - 21:29
Back to Top