CVE-2008-3933Improper Input Validation in Wireshark

Severity
3.3LOWNVD
EPSS
0.2%
top 61.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 4
Latest updateMay 2

Description

Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.

CVSS vector

AV:A/AC:L/C:N/I:N/A:PExploitability: 6.5 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.0.3-1 (bookworm)
Debianwireshark/wireshark< 1.0.3-1+3
NVDwireshark/wireshark22 versions+21

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jwfr-jmg6-pgjf: Wireshark (formerly Ethereal) 02022-05-02
OSV
CVE-2008-3933: Wireshark (formerly Ethereal) 02008-09-04

📋Vendor Advisories

2
Red Hat
wireshark: crash triggered by zlib-compressed packet data2008-09-03
Debian
CVE-2008-3933: wireshark - Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a ...2008

💬Community

1
Bugzilla
CVE-2008-3933 wireshark: crash triggered by zlib-compressed packet data2008-09-05