CVE-2009-1268

The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://secunia.com/advisories/34778
http://secunia.com/advisories/34970
http://secunia.com/advisories/35133
http://secunia.com/advisories/35224
http://secunia.com/advisories/35416
http://secunia.com/advisories/35464
http://secunia.com/advisories/37477
http://wiki.rpath.com/Advisories:rPSA-2009-0062
http://www.debian.org/security/2009/dsa-1785
http://www.debian.org/security/2009/dsa-1942
http://www.mandriva.com/security/advisories?name=MDVSA-2009:088 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1100.html
http://www.securityfocus.com/archive/1/502745/100/0/threaded
http://www.securityfocus.com/bid/34457
http://www.securitytracker.com/id?1022027
http://www.wireshark.org/security/wnpa-sec-2009-02.html Vendor Advisory
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3269 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49815
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10876
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5335
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00675.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01167.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01213.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://secunia.com/advisories/34778
http://secunia.com/advisories/34970
http://secunia.com/advisories/35133
http://secunia.com/advisories/35224
http://secunia.com/advisories/35416
http://secunia.com/advisories/35464
http://secunia.com/advisories/37477
http://wiki.rpath.com/Advisories:rPSA-2009-0062
http://www.debian.org/security/2009/dsa-1785
http://www.debian.org/security/2009/dsa-1942
http://www.mandriva.com/security/advisories?name=MDVSA-2009:088 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1100.html
http://www.securityfocus.com/archive/1/502745/100/0/threaded
http://www.securityfocus.com/bid/34457
http://www.securitytracker.com/id?1022027
http://www.wireshark.org/security/wnpa-sec-2009-02.html Vendor Advisory
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3269 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49815
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10876
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5335
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00675.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01167.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01213.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wireshark:wireshark:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.6a:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:02

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html -
References () http://secunia.com/advisories/34778 - () http://secunia.com/advisories/34778 -
References () http://secunia.com/advisories/34970 - () http://secunia.com/advisories/34970 -
References () http://secunia.com/advisories/35133 - () http://secunia.com/advisories/35133 -
References () http://secunia.com/advisories/35224 - () http://secunia.com/advisories/35224 -
References () http://secunia.com/advisories/35416 - () http://secunia.com/advisories/35416 -
References () http://secunia.com/advisories/35464 - () http://secunia.com/advisories/35464 -
References () http://secunia.com/advisories/37477 - () http://secunia.com/advisories/37477 -
References () http://wiki.rpath.com/Advisories:rPSA-2009-0062 - () http://wiki.rpath.com/Advisories:rPSA-2009-0062 -
References () http://www.debian.org/security/2009/dsa-1785 - () http://www.debian.org/security/2009/dsa-1785 -
References () http://www.debian.org/security/2009/dsa-1942 - () http://www.debian.org/security/2009/dsa-1942 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:088 - Vendor Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2009:088 - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2009-1100.html - () http://www.redhat.com/support/errata/RHSA-2009-1100.html -
References () http://www.securityfocus.com/archive/1/502745/100/0/threaded - () http://www.securityfocus.com/archive/1/502745/100/0/threaded -
References () http://www.securityfocus.com/bid/34457 - () http://www.securityfocus.com/bid/34457 -
References () http://www.securitytracker.com/id?1022027 - () http://www.securitytracker.com/id?1022027 -
References () http://www.wireshark.org/security/wnpa-sec-2009-02.html - Vendor Advisory () http://www.wireshark.org/security/wnpa-sec-2009-02.html - Vendor Advisory
References () https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3269 - Vendor Advisory () https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3269 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49815 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49815 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10876 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10876 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5335 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5335 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00675.html - () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00675.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01167.html - () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01167.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01213.html - () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01213.html -

Information

Published : 2009-04-13 16:30

Updated : 2024-11-21 01:02


NVD link : CVE-2009-1268

Mitre link : CVE-2009-1268

CVE.ORG link : CVE-2009-1268


JSON object : View

Products Affected

wireshark

  • wireshark
CWE
CWE-20

Improper Input Validation