Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*", "matchCriteriaId": "503E7F73-0E2A-442C-9B76-679A2AD03052", "vulnerable": true}, {"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*", "matchCriteriaId": "FDF374E8-36A3-43AA-B86C-092F5B244841", "vulnerable": true}, {"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3C422E5-3252-48C2-B4FF-E32AA5463D97", "vulnerable": true}, {"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*", "matchCriteriaId": "31C43A78-E578-4B1C-8E33-24529E973E30", "vulnerable": true}, {"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*", "matchCriteriaId": "A0D56DA6-3EB2-4074-8C43-A5FD93B1555B", "vulnerable": true}, {"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1074B30-F2E6-47CD-8491-29163811E07F", "vulnerable": true}, {"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*", "matchCriteriaId": "10FAAC5E-DD4E-49EF-A051-2F80BACC20D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*", "matchCriteriaId": "BB52B779-7A2D-43E0-9F12-C65053002EBC", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE62DEB3-8DF4-424C-AE9C-0573432692B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.16:*:*:*:*:*:*:*", "matchCriteriaId": "2E737F77-ABE6-4E3E-9156-4FAF841E8314", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.17:*:*:*:*:*:*:*", "matchCriteriaId": "E4B5EB4E-D9D6-4324-BEB6-85C2845AC102", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*", "matchCriteriaId": "9DC35478-9276-4732-9F0D-13CA958C617C", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*", "matchCriteriaId": "77000951-EF3E-41D8-8545-497BA3E5C5E1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "83C48EC3-D0BA-4A5D-93B0-6931CB3587AB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB461B6B-B731-4732-AAD0-191BE50189D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "19961880-D38A-4785-A7C5-879A061119BE", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "831705D2-C4DE-475F-B908-8859064AFB38", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "A4622585-20E2-46E9-B773-74729FF22EEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "E86ADCB6-0940-4CB9-85F1-A7694210FB66", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "042B6289-D2E2-4369-BB40-EA6EE7025D23", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "C93D7B7E-F5F9-44A2-A87B-4A16634DEDAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "F0A48938-30B8-4403-B08A-177FFCB9054B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "C9A33AA4-CABF-4B6B-8688-8C1BD36D6649", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "67B81EFD-27C1-411C-AFF3-E5340627E3BA", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "680934CF-7F9B-41E4-AA03-ECD96F477AB9", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F3D3E-A6D6-4C1A-8BC6-5579C19A7A45", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "3BCF3AFF-ED4D-40F6-A2DD-04C0A6D3BD64", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*", "matchCriteriaId": "DBCCE368-64E6-4CEC-B068-9B8BA2527289", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "CF5374A4-5194-45FD-895D-B04FDC7E853C", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "4038BC6D-DE51-4F1C-A25C-CD7FC6CE8CF6", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "338CEFD7-EBC0-43FB-B482-9A3D0834447E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "136FF83B-2B03-4E5F-95C1-84195BE8392A", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "898E6919-542F-4A31-8CC0-C3C4CE0F9FCF", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "350ABD20-6BB8-4EDB-9DD1-6D1802D892A7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F5A659C0-2CDA-44EF-9D5F-0A57B3F14E5E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB12CA01-E0EA-4E84-802F-CC52268D65FD", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "9704EC6E-7219-41FC-BE00-CD91A246C61E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "2B93B95E-F295-468C-A6A2-5AA6DE729E52", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "AE94BFB1-67E2-4503-AEA8-2CD5DBD4F88B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*", "matchCriteriaId": "8D45EF17-50C9-4FF9-A41C-C78A0C40AD20", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*", "matchCriteriaId": "729D34A7-45FD-40E8-ACC6-C5746E611789", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*", "matchCriteriaId": "C82B4A05-CF96-4EF6-AA0D-40F9D6FF003C", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*", "matchCriteriaId": "F82FE048-D644-4909-AEA6-CFB853460555", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*", "matchCriteriaId": "0F04983B-4A05-4E83-A7E9-D7090AA067AB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.14:*:*:*:*:*:*:*", "matchCriteriaId": "B42F1374-B044-472F-ACE4-34FF26F36DCD", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors."}, {"lang": "es", "value": "El Bluetooth SDP dissector Wireshark (formalmente Ethereal), desde la versi\u00f3n 0.99.2 a la 0.99.6, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio(por bucle infinito) usando vectores desconocidos."}], "id": "CVE-2007-6120", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2007-11-23T20:46:00.000", "references": [{"source": "secalert@redhat.com", "url": "http://bugs.gentoo.org/show_bug.cgi?id=199958"}, {"source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/27777"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/27817"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28197"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28207"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28288"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28304"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28325"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28564"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28583"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/29048"}, {"source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-200712-23.xml"}, {"source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1018988"}, {"source": "secalert@redhat.com", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004"}, {"source": "secalert@redhat.com", "url": "http://www.debian.org/security/2007/dsa-1414"}, {"source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:001"}, {"source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:1"}, {"source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0058.html"}, {"source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0059.html"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/485792/100/0/threaded"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/26532"}, {"source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2007/3956"}, {"source": "secalert@redhat.com", "url": "http://www.wireshark.org/security/wnpa-sec-2007-03.html"}, {"source": "secalert@redhat.com", "url": "https://issues.rpath.com/browse/RPL-1975"}, {"source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14802"}, {"source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9488"}, {"source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html"}, {"source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.gentoo.org/show_bug.cgi?id=199958"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/27777"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/27817"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28197"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28207"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28288"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28304"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28325"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28564"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/28583"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/29048"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200712-23.xml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018988"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1414"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:001"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0058.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0059.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/485792/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/26532"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3956"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.wireshark.org/security/wnpa-sec-2007-03.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1975"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14802"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9488"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}