Unrated severityNVD Advisory· Published Apr 13, 2009· Updated Apr 23, 2026
CVE-2009-1268
CVE-2009-1268
Description
The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
Affected products
22cpe:2.3:a:wireshark:wireshark:0.9.6:*:*:*:*:*:*:*+ 21 more
- cpe:2.3:a:wireshark:wireshark:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.6a:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- www.mandriva.com/security/advisoriesnvdVendor Advisory
- www.wireshark.org/security/wnpa-sec-2009-02.htmlnvdVendor Advisory
- bugs.wireshark.org/bugzilla/show_bug.cginvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.htmlnvd
- secunia.com/advisories/34778nvd
- secunia.com/advisories/34970nvd
- secunia.com/advisories/35133nvd
- secunia.com/advisories/35224nvd
- secunia.com/advisories/35416nvd
- secunia.com/advisories/35464nvd
- secunia.com/advisories/37477nvd
- wiki.rpath.com/Advisories:rPSA-2009-0062nvd
- www.debian.org/security/2009/dsa-1785nvd
- www.debian.org/security/2009/dsa-1942nvd
- www.redhat.com/support/errata/RHSA-2009-1100.htmlnvd
- www.securityfocus.com/archive/1/502745/100/0/threadednvd
- www.securityfocus.com/bid/34457nvd
- www.securitytracker.com/idnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/49815nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10876nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5335nvd
- www.redhat.com/archives/fedora-package-announce/2009-May/msg00675.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2009-May/msg01167.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2009-May/msg01213.htmlnvd
News mentions
0No linked articles in our index yet.