FKIE_CVE-2007-6120
Vulnerability from fkie_nvd - Published: 2007-11-23 20:46 - Updated: 2025-04-09 00:30
Severity ?
Summary
The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "503E7F73-0E2A-442C-9B76-679A2AD03052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF374E8-36A3-43AA-B86C-092F5B244841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C422E5-3252-48C2-B4FF-E32AA5463D97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "31C43A78-E578-4B1C-8E33-24529E973E30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D56DA6-3EB2-4074-8C43-A5FD93B1555B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1074B30-F2E6-47CD-8491-29163811E07F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*",
"matchCriteriaId": "10FAAC5E-DD4E-49EF-A051-2F80BACC20D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BB52B779-7A2D-43E0-9F12-C65053002EBC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE62DEB3-8DF4-424C-AE9C-0573432692B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2E737F77-ABE6-4E3E-9156-4FAF841E8314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B5EB4E-D9D6-4324-BEB6-85C2845AC102",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC35478-9276-4732-9F0D-13CA958C617C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*",
"matchCriteriaId": "77000951-EF3E-41D8-8545-497BA3E5C5E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "83C48EC3-D0BA-4A5D-93B0-6931CB3587AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CB461B6B-B731-4732-AAD0-191BE50189D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "19961880-D38A-4785-A7C5-879A061119BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "831705D2-C4DE-475F-B908-8859064AFB38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A4622585-20E2-46E9-B773-74729FF22EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E86ADCB6-0940-4CB9-85F1-A7694210FB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "042B6289-D2E2-4369-BB40-EA6EE7025D23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C93D7B7E-F5F9-44A2-A87B-4A16634DEDAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A48938-30B8-4403-B08A-177FFCB9054B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A33AA4-CABF-4B6B-8688-8C1BD36D6649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "67B81EFD-27C1-411C-AFF3-E5340627E3BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "680934CF-7F9B-41E4-AA03-ECD96F477AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1F3D3E-A6D6-4C1A-8BC6-5579C19A7A45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCF3AFF-ED4D-40F6-A2DD-04C0A6D3BD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DBCCE368-64E6-4CEC-B068-9B8BA2527289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5374A4-5194-45FD-895D-B04FDC7E853C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*",
"matchCriteriaId": "4038BC6D-DE51-4F1C-A25C-CD7FC6CE8CF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "338CEFD7-EBC0-43FB-B482-9A3D0834447E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "136FF83B-2B03-4E5F-95C1-84195BE8392A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "898E6919-542F-4A31-8CC0-C3C4CE0F9FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "350ABD20-6BB8-4EDB-9DD1-6D1802D892A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F5A659C0-2CDA-44EF-9D5F-0A57B3F14E5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FB12CA01-E0EA-4E84-802F-CC52268D65FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9704EC6E-7219-41FC-BE00-CD91A246C61E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2B93B95E-F295-468C-A6A2-5AA6DE729E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AE94BFB1-67E2-4503-AEA8-2CD5DBD4F88B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8D45EF17-50C9-4FF9-A41C-C78A0C40AD20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "729D34A7-45FD-40E8-ACC6-C5746E611789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C82B4A05-CF96-4EF6-AA0D-40F9D6FF003C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F82FE048-D644-4909-AEA6-CFB853460555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0F04983B-4A05-4E83-A7E9-D7090AA067AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B42F1374-B044-472F-ACE4-34FF26F36DCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors."
},
{
"lang": "es",
"value": "El Bluetooth SDP dissector Wireshark (formalmente Ethereal), desde la versi\u00f3n 0.99.2 a la 0.99.6, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio(por bucle infinito) usando vectores desconocidos."
}
],
"id": "CVE-2007-6120",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-11-23T20:46:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=199958"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27777"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27817"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28197"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28207"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28288"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28304"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28325"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28564"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28583"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29048"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200712-23.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1018988"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2007/dsa-1414"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:001"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0058.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0059.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/485792/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/26532"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/3956"
},
{
"source": "secalert@redhat.com",
"url": "http://www.wireshark.org/security/wnpa-sec-2007-03.html"
},
{
"source": "secalert@redhat.com",
"url": "https://issues.rpath.com/browse/RPL-1975"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14802"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9488"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=199958"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27777"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27817"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28288"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28325"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28564"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28583"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29048"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200712-23.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1018988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0058.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0059.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/485792/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/26532"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3956"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.wireshark.org/security/wnpa-sec-2007-03.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1975"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9488"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…