Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-3145

Опубликовано: 16 июл. 2008
Источник: debian
EPSS Низкий

Описание

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed1.0.2-1package

Примечания

  • http://www.wireshark.org/security/wnpa-sec-2008-04.html

EPSS

Процентиль: 84%
0.0242
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

redhat
почти 17 лет назад

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

nvd
почти 17 лет назад

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

github
около 3 лет назад

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

oracle-oval
больше 16 лет назад

ELSA-2008-0890: wireshark security update (MODERATE)

EPSS

Процентиль: 84%
0.0242
Низкий