CVE-2006-4574

Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P Broken Link
http://secunia.com/advisories/22590 Broken Link Vendor Advisory
http://secunia.com/advisories/22659 Broken Link
http://secunia.com/advisories/22672 Broken Link
http://secunia.com/advisories/22692 Broken Link
http://secunia.com/advisories/22797 Broken Link
http://secunia.com/advisories/22841 Broken Link
http://secunia.com/advisories/22929 Broken Link
http://secunia.com/advisories/23096 Broken Link
http://securitytracker.com/id?1017129 Broken Link Third Party Advisory VDB Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:195 Third Party Advisory
http://www.novell.com/linux/security/advisories/2006_65_ethereal.html Broken Link
http://www.redhat.com/support/errata/RHSA-2006-0726.html Broken Link
http://www.securityfocus.com/archive/1/450307/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/20762 Broken Link Third Party Advisory VDB Entry
http://www.us.debian.org/security/2006/dsa-1201 Broken Link
http://www.vupen.com/english/advisories/2006/4220 Broken Link
http://www.wireshark.org/security/wnpa-sec-2006-03.html Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29844 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-746 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

History

15 Feb 2024, 21:20

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P - Broken Link
References () http://secunia.com/advisories/22590 - Vendor Advisory () http://secunia.com/advisories/22590 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/22659 - () http://secunia.com/advisories/22659 - Broken Link
References () http://secunia.com/advisories/22672 - () http://secunia.com/advisories/22672 - Broken Link
References () http://secunia.com/advisories/22692 - () http://secunia.com/advisories/22692 - Broken Link
References () http://secunia.com/advisories/22797 - () http://secunia.com/advisories/22797 - Broken Link
References () http://secunia.com/advisories/22841 - () http://secunia.com/advisories/22841 - Broken Link
References () http://secunia.com/advisories/22929 - () http://secunia.com/advisories/22929 - Broken Link
References () http://secunia.com/advisories/23096 - () http://secunia.com/advisories/23096 - Broken Link
References () http://securitytracker.com/id?1017129 - () http://securitytracker.com/id?1017129 - Broken Link, Third Party Advisory, VDB Entry
References () http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:195 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:195 - Third Party Advisory
References () http://www.novell.com/linux/security/advisories/2006_65_ethereal.html - () http://www.novell.com/linux/security/advisories/2006_65_ethereal.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2006-0726.html - () http://www.redhat.com/support/errata/RHSA-2006-0726.html - Broken Link
References () http://www.securityfocus.com/archive/1/450307/100/0/threaded - () http://www.securityfocus.com/archive/1/450307/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/20762 - () http://www.securityfocus.com/bid/20762 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.us.debian.org/security/2006/dsa-1201 - () http://www.us.debian.org/security/2006/dsa-1201 - Broken Link
References () http://www.vupen.com/english/advisories/2006/4220 - () http://www.vupen.com/english/advisories/2006/4220 - Broken Link
References () http://www.wireshark.org/security/wnpa-sec-2006-03.html - () http://www.wireshark.org/security/wnpa-sec-2006-03.html - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29844 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29844 - Third Party Advisory, VDB Entry
References () https://issues.rpath.com/browse/RPL-746 - () https://issues.rpath.com/browse/RPL-746 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740 - Broken Link
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE NVD-CWE-Other CWE-193
CWE-617
CPE cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

Information

Published : 2006-10-28 00:07

Updated : 2024-02-15 21:20


NVD link : CVE-2006-4574

Mitre link : CVE-2006-4574

CVE.ORG link : CVE-2006-4574


JSON object : View

Products Affected

wireshark

  • wireshark
CWE
CWE-193

Off-by-one Error

CWE-617

Reachable Assertion