10
CVE-2006-3628
- EPSS 5.89%
- Published 21.07.2006 14:03:00
- Last modified 03.04.2025 01:03:51
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
Data is provided by the National Vulnerability Database (NVD)
Ethereal Group ≫ Ethereal Version0.10
Ethereal Group ≫ Ethereal Version0.10.0
Ethereal Group ≫ Ethereal Version0.10.0a
Ethereal Group ≫ Ethereal Version0.10.1
Ethereal Group ≫ Ethereal Version0.10.2
Ethereal Group ≫ Ethereal Version0.10.3
Ethereal Group ≫ Ethereal Version0.10.4
Ethereal Group ≫ Ethereal Version0.10.5
Ethereal Group ≫ Ethereal Version0.10.6
Ethereal Group ≫ Ethereal Version0.10.7
Ethereal Group ≫ Ethereal Version0.10.8
Ethereal Group ≫ Ethereal Version0.10.9
Ethereal Group ≫ Ethereal Version0.10.10
Ethereal Group ≫ Ethereal Version0.10.11
Ethereal Group ≫ Ethereal Version0.10.12
Ethereal Group ≫ Ethereal Version0.10.13
Ethereal Group ≫ Ethereal Version0.10.14
Ethereal Group ≫ Ethereal Version0.99.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 5.89% | 0.896 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.