Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-ddzu-ww85-mfha
Vulnerability ID VCID-ddzu-ww85-mfha
Aliases CVE-2009-0600
Summary Multiple vulnerabilities have been discovered in Wireshark which allow for Denial of Service or remote code execution.
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0600.json
https://api.first.org/data/v1/epss?cve=CVE-2009-0600
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600
http://secunia.com/advisories/33872
http://secunia.com/advisories/34144
http://secunia.com/advisories/34264
http://secunia.com/advisories/34344
https://issues.rpath.com/browse/RPL-2984
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10853
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15041
http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00652.html
http://wiki.rpath.com/Advisories:rPSA-2009-0040
http://www.redhat.com/support/errata/RHSA-2009-0313.html
http://www.securityfocus.com/archive/1/501763/100/0/threaded
http://www.securityfocus.com/bid/33690
http://www.securitytracker.com/id?1021697
http://www.vupen.com/english/advisories/2009/0370
http://www.wireshark.org/security/wnpa-sec-2009-01.html
485889 https://bugzilla.redhat.com/show_bug.cgi?id=485889
cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.6a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.6a:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
CVE-2009-0600 https://nvd.nist.gov/vuln/detail/CVE-2009-0600
GLSA-200906-05 https://security.gentoo.org/glsa/200906-05
RHSA-2009:0313 https://access.redhat.com/errata/RHSA-2009:0313
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2009-0600
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.86325
EPSS Score 0.02919
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:01:44.144322+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/200906-05 38.0.0