{"vuid":"VU#363992","idnumber":"363992","name":"Wireshark HTTP dissector vulnerability","keywords":["Wireshark","DoS","denial of service","HTTP dissector"],"overview":"Wireshark contains a vulnerability in the HTTP dissector that may allow an attacker to cause a denial of service condition.","clean_desc":"Wireshark contains a vulnerability in the HTTP dissector that may allow an attacker to cause a denial of service condition. This vulnerability may be triggered when a remote attacker sends a specially crafted, malformed packet to a vulnerable Wireshark installation or by convincing the user to read a malformed packet trace file with Wireshark. Wireshark states that Wireshark version 0.99.3 is affected. Note: Ethereal has changed its name to Wireshark.","impact":"A remote attacker may be able to cause a denial of service condition.","resolution":"Update\nWireshark has released an updated product version (Wireshark 0.99.4).","workarounds":"Workaround Wireshark provides a workaround in security document wnpa-sec-2006-03.","sysaffected":"","thanks":"This vulnerability was reported in Wireshark Document \nwnpa-sec-2006-03","author":"This document was written by Katie Steiner.","public":["http://www.wireshark.org/security/wnpa-sec-2006-03.html","http://www.securityfocus.com/bid/20762","http://secunia.com/advisories/22590","http://secunia.com/advisories/22672/","http://secunia.com/advisories/22692/","http://secunia.com/advisories/22797/","http://secunia.com/advisories/22841/","http://secunia.com/advisories/22929/","http://secunia.com/advisories/23096/"],"cveids":["CVE-2006-5468"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-01T16:19:19Z","publicdate":"2006-10-27T00:00:00Z","datefirstpublished":"2007-01-02T20:38:58Z","dateupdated":"2007-01-02T20:39:09Z","revision":17,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"11","cam_attackeraccessrequired":"20","cam_scorecurrent":"11.385","cam_scorecurrentwidelyknown":"13.86","cam_scorecurrentwidelyknownexploited":"23.76","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.385,"vulnote":null}