CVE-2007-3389
Wireshark crashes when inspecting HTTP traffic
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.
Wireshark anterior a 0.99.6 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una codificación manual por trozos (crafted chunked encoding) en una respuesta HTTP, posiblemente relacionado con un segmento de datos (payload) de longitud cero.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-06-25 CVE Reserved
- 2007-06-26 CVE Published
- 2024-06-06 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (24)
URL | Tag | Source |
---|---|---|
http://osvdb.org/37643 | Vdb Entry | |
http://secunia.com/advisories/25833 | Third Party Advisory | |
http://secunia.com/advisories/25987 | Third Party Advisory | |
http://secunia.com/advisories/26004 | Third Party Advisory | |
http://secunia.com/advisories/26499 | Third Party Advisory | |
http://secunia.com/advisories/27592 | Third Party Advisory | |
http://secunia.com/advisories/28583 | Third Party Advisory | |
http://www.securityfocus.com/bid/24662 | Vdb Entry | |
http://www.securitytracker.com/id?1018315 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/2353 | Vdb Entry | |
http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html | X_refsource_confirm | |
http://www.wireshark.org/security/wnpa-sec-2007-02.html | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35207 | Vdb Entry | |
https://issues.rpath.com/browse/RPL-1498 | X_refsource_confirm | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9964 | Signature | |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.0 Search vendor "Wireshark" for product "Wireshark" and version "0.99.0" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.1 Search vendor "Wireshark" for product "Wireshark" and version "0.99.1" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.2 Search vendor "Wireshark" for product "Wireshark" and version "0.99.2" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.3 Search vendor "Wireshark" for product "Wireshark" and version "0.99.3" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.4 Search vendor "Wireshark" for product "Wireshark" and version "0.99.4" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.5 Search vendor "Wireshark" for product "Wireshark" and version "0.99.5" | - |
Affected
|