Vulnerability & Exploit Database

Displaying all 8 entries

Results for: CVE-2008-4683 Back to search

SUSE Linux Security Advisory: SUSE-SR:2009:001 Vulnerability

  • Severity: 10
  • Published: November 10, 2008

Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicod...

Wireshark : CVE-2008-4683 : Multiple problems in Wireshark Vulnerability

  • Severity: 5
  • Published: October 22, 2008

The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.

SUSE Linux Security Vulnerability: CVE-2008-4683 Vulnerability

  • Severity: 5
  • Published: October 22, 2008

The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.

RHSA-2009:0313: wireshark security update Vulnerability

  • Severity: 5
  • Published: October 22, 2008

Wireshark is a program for monitoring network traffic. Wireshark waspreviously known as Ethereal.Multiple buffer overflow flaws were found in Wireshark. If Wireshark reada malformed packet off a network or opened a malformed dump file, it couldcrash or, possibly, execute arbitrary code as the user running Wireshark.(CVE-2008-4683, CVE-20...

Gentoo Linux: CVE-2008-4683: Wireshark: Multiple vulnerabilities Vulnerability

  • Severity: 5
  • Published: October 22, 2008

The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.

Cent OS: CVE-2008-4683: CESA-2009:0313 (wireshark) Vulnerability

  • Severity: 5
  • Published: October 22, 2008

The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.

HTTP TRACE Method Enabled Vulnerability

  • Severity: 6
  • Published: November 01, 2004

The HTTP TRACE method is normally used to return the full HTTP request back to the requesting client for proxy-debugging purposes. An attacker can create a webpage using XMLHTTP, ActiveX, or XMLDOM to cause a client to issue a TRACE request and capture the client's cookies. This effectively results in a Cross-Site Scripting attack.