Description
The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1673-1 | New wireshark packages fix several vulnerabilities |
EUVD |
EUVD-2008-4663 | The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T10:24:20.686Z
Reserved: 2008-10-22T00:00:00.000Z
Link: CVE-2008-4683
No data.
Status : Modified
Published: 2008-10-22T18:00:01.083
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-4683
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD