ID CVE-2007-6111
Summary Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
References
Vulnerable Configurations
  • cpe:2.3:a:ethereal_group:ethereal:0.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.10:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.12:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.12:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.16:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.16:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.17:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.17:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.17a:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.17a:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.8.20:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.8.20:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.9_.0:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.9_.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.0a:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.0a:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.10.14:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.10.14:*:*:*:*:*:*:*
  • cpe:2.3:a:ethereal_group:ethereal:0.99.0:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:0.99.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
CVSS
Base: 7.1 (as of 15-10-2018 - 21:49)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:C
oval via4
accepted 2013-04-29T04:18:10.193-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
family unix
id oval:org.mitre.oval:def:9048
status accepted
submitted 2010-07-09T03:56:16-04:00
title Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
version 24
redhat via4
advisories
rhsa
id RHSA-2008:0058
rpms
  • wireshark-0:0.99.7-1.el4
  • wireshark-gnome-0:0.99.7-1.el4
  • libsmi-0:0.4.5-2.el4
  • libsmi-devel-0:0.4.5-2.el4
  • wireshark-0:0.99.7-1.el5
  • wireshark-gnome-0:0.99.7-1.el5
  • libsmi-0:0.4.5-2.el5
  • libsmi-devel-0:0.4.5-2.el5
refmap via4
bid 26532
bugtraq 20080103 rPSA-2008-0004-1 tshark wireshark
confirm
fedora
  • FEDORA-2007-4590
  • FEDORA-2007-4690
gentoo GLSA-200712-23
mandriva
  • MDVSA-2008:001
  • MDVSA-2008:1
misc http://bugs.gentoo.org/show_bug.cgi?id=199958
sectrack 1018988
secunia
  • 27777
  • 28197
  • 28207
  • 28288
  • 28304
  • 28325
  • 28564
  • 29048
suse SUSE-SR:2008:004
vupen ADV-2007-3956
Last major update 15-10-2018 - 21:49
Published 23-11-2007 - 20:46
Back to Top