Vulnerabilidad en Desbordamiento de buffer en el ANSI MAP dissector para Wireshark (CVE-2007-6115)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
23/11/2007
Última modificación:
09/04/2025
Descripción
Desbordamiento de buffer en el ANSI MAP dissector para Wireshark (formalmente Ethereal), desde la versión 0.99.5 a la 0.99.6. Cuando se ejecuta en plataformas no especificadas, permite que atacantes remotos causen una denegación de servicio y, posiblemente, que ejecuten código de su elección, utilizando vectores desconocidos.
Impacto
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.gentoo.org/show_bug.cgi?id=199958
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
- http://secunia.com/advisories/27777
- http://secunia.com/advisories/28197
- http://secunia.com/advisories/28207
- http://secunia.com/advisories/28288
- http://secunia.com/advisories/28304
- http://secunia.com/advisories/28325
- http://secunia.com/advisories/28564
- http://secunia.com/advisories/28583
- http://secunia.com/advisories/29048
- http://security.gentoo.org/glsa/glsa-200712-23.xml
- http://securitytracker.com/id?1018988=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A001
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A1
- http://www.redhat.com/support/errata/RHSA-2008-0058.html
- http://www.redhat.com/support/errata/RHSA-2008-0059.html
- http://www.securityfocus.com/archive/1/485792/100/0/threaded
- http://www.securityfocus.com/bid/26532
- http://www.vupen.com/english/advisories/2007/3956
- http://www.wireshark.org/security/wnpa-sec-2007-03.html
- https://issues.rpath.com/browse/RPL-1975
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14578
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9726
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html
- http://bugs.gentoo.org/show_bug.cgi?id=199958
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
- http://secunia.com/advisories/27777
- http://secunia.com/advisories/28197
- http://secunia.com/advisories/28207
- http://secunia.com/advisories/28288
- http://secunia.com/advisories/28304
- http://secunia.com/advisories/28325
- http://secunia.com/advisories/28564
- http://secunia.com/advisories/28583
- http://secunia.com/advisories/29048
- http://security.gentoo.org/glsa/glsa-200712-23.xml
- http://securitytracker.com/id?1018988=
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A001
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A1
- http://www.redhat.com/support/errata/RHSA-2008-0058.html
- http://www.redhat.com/support/errata/RHSA-2008-0059.html
- http://www.securityfocus.com/archive/1/485792/100/0/threaded
- http://www.securityfocus.com/bid/26532
- http://www.vupen.com/english/advisories/2007/3956
- http://www.wireshark.org/security/wnpa-sec-2007-03.html
- https://issues.rpath.com/browse/RPL-1975
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14578
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9726
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html



