Vulnerability in WireShark 1.0.4 for DoS Attack

2008-12-02 / 2008-12-03
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-399


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

Vulnerability in WireShark 1.0.4 for DoS Attack 1. General Information On Nov 2008, Security Vulnerability Research Team of Bkis (SVRT-Bkis) has detected a vulnerability underlying WireShark 1.0.4 (lastest version). The flaw is in the function processing SMTP protocol and enables hacker to perform a DoS attack by sending a SMTP request with large content to port 25. The application then enter a large loop and cannot do anything else. We have contacted the vendor of Wireshark. They fixed this vulnerability for Wireshark 1.0.5 but they haven't released the official version yet. Details is here : http://wiki.wireshark.org/Development/Roadmap SVRT Advisory : SVRT-04-08 Initial vendor notification : 11-14-2008 Release Date : 11-22-2008 Update Date : 11-22-2008 Discovered by : SVRT-Bkis Security Rating : Less Critical Impact : DoS Affected Software :Wireshark 1.0.4 (prev is vulnerable) 2. Solution Althrough the official version for this vulnerability hasn't been released yet, the vendor has updated the fix in the prerelease Wireshark 1.0.5. Download the prerelease version of Wireshark 1.0.5 here: http://www.wireshark.org/download/prerelease/ ---------------------------------------------------------------- Bach Khoa Internetwork Security Center (BKIS) Hanoi University of Technology (Vietnam) Office : 5th Floor, Hitech building - 1A Dai Co Viet, Hanoi Email : svrt[at]bkav.com.vn Website : www.bkav.com.vn WebBlog : security.bkis.vn ----------------------------------------------------------------

References:

http://secunia.com/advisories/32840
https://bugzilla.redhat.com/show_bug.cgi?id=472737
http://www.securitytracker.com/id?1021275
http://www.securityfocus.com/archive/1/archive/1/498562/100/0/threaded
http://www.openwall.com/lists/oss-security/2008/11/24/1
http://www.frsirt.com/english/advisories/2008/3231
http://lists.grok.org.uk/pipermail/full-disclosure/2008-November/065840.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top