Upstream information

CVE-2008-4683 at MITRE


The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 437317 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 SDK for x86
Novell Linux Desktop 9 SDK for x86_64
Open Enterprise Server
  • ethereal >= 0.10.13-2.38
YOU Patch Nr: 12323
SUSE Linux Enterprise SDK 10 SP2
  • ethereal-devel >= 0.10.14-16.31
ZYPP Patch Nr: 5866
openSUSE 11.0
  • wireshark-debuginfo >= 1.0.0-17.7
  • wireshark-debugsource >= 1.0.0-17.7
openSUSE 11.0
  • wireshark >= 1.0.0-17.7
  • wireshark-devel >= 1.0.0-17.7