CVE-2006-4805

epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
http://secunia.com/advisories/22590 Vendor Advisory
http://secunia.com/advisories/22659
http://secunia.com/advisories/22672
http://secunia.com/advisories/22692
http://secunia.com/advisories/22797
http://secunia.com/advisories/22841
http://secunia.com/advisories/22929
http://secunia.com/advisories/23096
http://securitytracker.com/id?1017129
http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm
http://www.kb.cert.org/vuls/id/723736 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:195
http://www.novell.com/linux/security/advisories/2006_65_ethereal.html
http://www.redhat.com/support/errata/RHSA-2006-0726.html
http://www.securityfocus.com/archive/1/450307/100/0/threaded
http://www.securityfocus.com/bid/20762
http://www.us.debian.org/security/2006/dsa-1201
http://www.vupen.com/english/advisories/2006/4220
http://www.wireshark.org/security/wnpa-sec-2006-03.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/29843
https://issues.rpath.com/browse/RPL-746
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10199
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
http://secunia.com/advisories/22590 Vendor Advisory
http://secunia.com/advisories/22659
http://secunia.com/advisories/22672
http://secunia.com/advisories/22692
http://secunia.com/advisories/22797
http://secunia.com/advisories/22841
http://secunia.com/advisories/22929
http://secunia.com/advisories/23096
http://securitytracker.com/id?1017129
http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm
http://www.kb.cert.org/vuls/id/723736 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:195
http://www.novell.com/linux/security/advisories/2006_65_ethereal.html
http://www.redhat.com/support/errata/RHSA-2006-0726.html
http://www.securityfocus.com/archive/1/450307/100/0/threaded
http://www.securityfocus.com/bid/20762
http://www.us.debian.org/security/2006/dsa-1201
http://www.vupen.com/english/advisories/2006/4220
http://www.wireshark.org/security/wnpa-sec-2006-03.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/29843
https://issues.rpath.com/browse/RPL-746
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10199
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P -
References () http://secunia.com/advisories/22590 - Vendor Advisory () http://secunia.com/advisories/22590 - Vendor Advisory
References () http://secunia.com/advisories/22659 - () http://secunia.com/advisories/22659 -
References () http://secunia.com/advisories/22672 - () http://secunia.com/advisories/22672 -
References () http://secunia.com/advisories/22692 - () http://secunia.com/advisories/22692 -
References () http://secunia.com/advisories/22797 - () http://secunia.com/advisories/22797 -
References () http://secunia.com/advisories/22841 - () http://secunia.com/advisories/22841 -
References () http://secunia.com/advisories/22929 - () http://secunia.com/advisories/22929 -
References () http://secunia.com/advisories/23096 - () http://secunia.com/advisories/23096 -
References () http://securitytracker.com/id?1017129 - () http://securitytracker.com/id?1017129 -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm -
References () http://www.kb.cert.org/vuls/id/723736 - US Government Resource () http://www.kb.cert.org/vuls/id/723736 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:195 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:195 -
References () http://www.novell.com/linux/security/advisories/2006_65_ethereal.html - () http://www.novell.com/linux/security/advisories/2006_65_ethereal.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0726.html - () http://www.redhat.com/support/errata/RHSA-2006-0726.html -
References () http://www.securityfocus.com/archive/1/450307/100/0/threaded - () http://www.securityfocus.com/archive/1/450307/100/0/threaded -
References () http://www.securityfocus.com/bid/20762 - () http://www.securityfocus.com/bid/20762 -
References () http://www.us.debian.org/security/2006/dsa-1201 - () http://www.us.debian.org/security/2006/dsa-1201 -
References () http://www.vupen.com/english/advisories/2006/4220 - () http://www.vupen.com/english/advisories/2006/4220 -
References () http://www.wireshark.org/security/wnpa-sec-2006-03.html - () http://www.wireshark.org/security/wnpa-sec-2006-03.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29843 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29843 -
References () https://issues.rpath.com/browse/RPL-746 - () https://issues.rpath.com/browse/RPL-746 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10199 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10199 -

Information

Published : 2006-10-27 23:07

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4805

Mitre link : CVE-2006-4805

CVE.ORG link : CVE-2006-4805


JSON object : View

Products Affected

wireshark

  • wireshark