{"vuid":"VU#638376","idnumber":"638376","name":"Wireshark contains multiple off-by-one errors in the IPSec ESP preference parser","keywords":["Wireshark","DoS","denial of service","off-by-one","IPSec","ESP"],"overview":"Wireshark contains a vulnerability in the IPSec ESP preference parser that may cause a denial-of-service condition.","clean_desc":"Wireshark contains multiple off-by-one vulnerabilities in the IPSec ESP preference parser when the application has been compiled with ESP decryption support. This vulnerability may be exploited when the remote attacker sends a specially crafted, malformed packet over the wire or by convincing the user to read a malformed packet trace file. Wireshark states that Wireshark Version  0.99.2 is affected. Note:  Ethereal has changed its name to Wireshark.","impact":"A remote attacker may be able to execute arbitrary code.","resolution":"Update\nWireshark has released an updated product version (Wireshark 0.99.3).","workarounds":"Workaround Wireshark provides a workaround in security document wnpa-sec-2006-02.","sysaffected":"","thanks":"This vulnerability was reported in Wireshark document \nwnpa-sec-2006-02","author":"This document was written by Katie Steiner.","public":["http://www.wireshark.org/security/wnpa-sec-2006-02.html","http://www.securityfocus.com/bid/19690","http://www.frsirt.com/english/advisories/2006/3370","http://securitytracker.com/id?1016736","http://secunia.com/advisories/21597","http://secunia.com/advisories/21649","http://secunia.com/advisories/21619","http://secunia.com/advisories/21682","http://secunia.com/advisories/21885","http://xforce.iss.net/xforce/xfdb/28553"],"cveids":["CVE-2006-4331"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-10-11T19:10:40Z","publicdate":"2006-08-24T00:00:00Z","datefirstpublished":"2006-10-25T14:30:28Z","dateupdated":"2006-10-25T17:14:59Z","revision":20,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"10","cam_easeofexploitation":"7","cam_attackeraccessrequired":"15","cam_scorecurrent":"4.921875","cam_scorecurrentwidelyknown":"5.90625","cam_scorecurrentwidelyknownexploited":"9.84375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.921875,"vulnote":null}