National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2007-6113 Detail

Current Description

Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet.

Source:  MITRE      Last Modified:  11/23/2007      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2007-6113
Original release date:
11/23/2007
Last revised:
09/28/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.3 MEDIUM
Vector:
(AV:N/AC:M/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (01/04/2008)

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-6113 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://bugs.gentoo.org/show_bug.cgi?id=199958 External Source MISC http://bugs.gentoo.org/show_bug.cgi?id=199958
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html External Source SUSE SUSE-SR:2008:004
http://security.gentoo.org/glsa/glsa-200712-23.xml External Source GENTOO GLSA-200712-23
http://securityreason.com/securityalert/3095 External Source SREASON 3095
http://securitytracker.com/id?1018988 External Source SECTRACK 1018988
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004 External Source CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004
http://www.mandriva.com/security/advisories?name=MDVSA-2008:001 External Source MANDRIVA MDVSA-2008:001
http://www.mandriva.com/security/advisories?name=MDVSA-2008:1 External Source MANDRIVA MDVSA-2008:1
http://www.redhat.com/support/errata/RHSA-2008-0058.html External Source REDHAT RHSA-2008:0058
http://www.redhat.com/support/errata/RHSA-2008-0059.html External Source REDHAT RHSA-2008:0059
http://www.securiteam.com/securitynews/5LP0V00MAI.html External Source MISC http://www.securiteam.com/securitynews/5LP0V00MAI.html
http://www.securityfocus.com/archive/1/archive/1/478497/100/0/threaded External Source BUGTRAQ 20070904 Wireshark DNP3 Dissector Infinite Loop Vulnerability
http://www.securityfocus.com/archive/1/archive/1/485792/100/0/threaded External Source BUGTRAQ 20080103 rPSA-2008-0004-1 tshark wireshark
http://www.securityfocus.com/bid/26532 Patch External Source BID 26532
http://www.securitytracker.com/id?1018635 External Source SECTRACK 1018635
http://www.vupen.com/english/advisories/2007/3956 Vendor Advisory External Source VUPEN ADV-2007-3956
http://www.wireshark.org/security/wnpa-sec-2007-03.html Patch; Vendor Advisory External Source CONFIRM http://www.wireshark.org/security/wnpa-sec-2007-03.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/36392 External Source XF wireshark-dnp3-dos(36392)
https://issues.rpath.com/browse/RPL-1975 External Source CONFIRM https://issues.rpath.com/browse/RPL-1975
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9841 External Source OVAL oval:org.mitre.oval:def:9841
https://www.exploit-db.com/exploits/4347 External Source EXPLOIT-DB 4347
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html External Source FEDORA FEDORA-2007-4590
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html External Source FEDORA FEDORA-2007-4690

References to Check Content

Identifier:
oval:org.mitre.oval:def:9841
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:9841

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:wireshark:wireshark:0.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.8.19:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.8.20:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.14:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.9.15:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.14:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 4 change records found - show changes