Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2008-3146


Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.


Published

2008-09-02T14:24:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 10.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application wireshark wireshark 0.9.7 Yes
Application wireshark wireshark 0.9.8 Yes
Application wireshark wireshark 0.99 Yes
Application wireshark wireshark 0.99.0 Yes
Application wireshark wireshark 0.99.1 Yes
Application wireshark wireshark 0.99.2 Yes
Application wireshark wireshark 0.99.3 Yes
Application wireshark wireshark 0.99.4 Yes
Application wireshark wireshark 0.99.5 Yes
Application wireshark wireshark 0.99.6 Yes
Application wireshark wireshark 0.99.6a Yes
Application wireshark wireshark 0.99.7 Yes
Application wireshark wireshark 0.99.8 Yes
Application wireshark wireshark 1.0 Yes
Application wireshark wireshark 1.0.0 Yes
Application wireshark wireshark 1.0.1 Yes
Application wireshark wireshark 1.0.2 Yes

References