Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-3145

Опубликовано: 10 июл. 2008
Источник: redhat

Описание

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=454984wireshark: crash in the packet reassembling

Связанные уязвимости

ubuntu
почти 17 лет назад

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

nvd
почти 17 лет назад

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

debian
почти 17 лет назад

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.1 ...

github
около 3 лет назад

The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.

oracle-oval
больше 16 лет назад

ELSA-2008-0890: wireshark security update (MODERATE)