CVE-2008-3141
wireshark: memory disclosure in the RMI dissector
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Unspecified vulnerability in the RMI dissector in Wireshark (formerly Ethereal) 0.9.5 through 1.0.0 allows remote attackers to read system memory via unspecified vectors.
Vulnerabilidad sin especificar en el analizador RMI en Wireshark (anteriormente Ethereal) de la v0.9.5 a la v1.0.0, permite a atacantes remotos leer la memoria del sistema a través de vectores no especificados.
Multiple vulnerabilities related to memory management were discovered in the GSM SMS dissector (CVE-2008-3137), the PANA and KISMET dissectors (CVE-2008-3138), the RTMPT dissector (CVE-2008-3139), the syslog dissector (CVE-2008-3140) and the RMI dissector (CVE-2008-3141) and when reassembling fragmented packets (CVE-2008-3145). Versions less than 1.0.2 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-07-10 CVE Reserved
- 2008-07-10 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (24)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/30942 | Third Party Advisory | |
http://secunia.com/advisories/31085 | Third Party Advisory | |
http://secunia.com/advisories/32944 | Third Party Advisory | |
http://securitytracker.com/id?1020404 | Vdb Entry | |
http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm | X_refsource_confirm | |
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0212 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/493882/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2008/1982/references | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/2773 | Vdb Entry | |
http://www.wireshark.org/security/wnpa-sec-2008-03.html | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43520 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11324 | Signature |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/30020 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html | 2018-10-11 | |
http://secunia.com/advisories/30886 | 2018-10-11 | |
http://secunia.com/advisories/31378 | 2018-10-11 | |
http://secunia.com/advisories/31687 | 2018-10-11 | |
http://secunia.com/advisories/32091 | 2018-10-11 | |
http://security.gentoo.org/glsa/glsa-200808-04.xml | 2018-10-11 | |
http://www.debian.org/security/2008/dsa-1673 | 2018-10-11 | |
http://www.redhat.com/support/errata/RHSA-2008-0890.html | 2018-10-11 | |
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00544.html | 2018-10-11 | |
https://access.redhat.com/security/cve/CVE-2008-3141 | 2008-10-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=454975 | 2008-10-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.9.5 Search vendor "Wireshark" for product "Wireshark" and version "0.9.5" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.2 Search vendor "Wireshark" for product "Wireshark" and version "0.99.2" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.3 Search vendor "Wireshark" for product "Wireshark" and version "0.99.3" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.4 Search vendor "Wireshark" for product "Wireshark" and version "0.99.4" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.5 Search vendor "Wireshark" for product "Wireshark" and version "0.99.5" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.6 Search vendor "Wireshark" for product "Wireshark" and version "0.99.6" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.7 Search vendor "Wireshark" for product "Wireshark" and version "0.99.7" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 0.99.8 Search vendor "Wireshark" for product "Wireshark" and version "0.99.8" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.0 Search vendor "Wireshark" for product "Wireshark" and version "1.0" | - |
Affected
| ||||||
Wireshark Search vendor "Wireshark" | Wireshark Search vendor "Wireshark" for product "Wireshark" | 1.0.0 Search vendor "Wireshark" for product "Wireshark" and version "1.0.0" | - |
Affected
|