Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-fbps-4k29-33f7
Vulnerability ID VCID-fbps-4k29-33f7
Aliases CVE-2007-3390
Summary Multiple vulnerabilities have been discovered in Wireshark, allowing for the remote execution of arbitrary code and a Denial of Service.
Status Published
Exploitability 0.5
Weighted Severity 4.5
Risk 2.2
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Reference id Reference type URL
http://osvdb.org/37642
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3390.json
https://api.first.org/data/v1/epss?cve=CVE-2007-3390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390
http://secunia.com/advisories/25833
http://secunia.com/advisories/25877
http://secunia.com/advisories/25987
http://secunia.com/advisories/26004
http://secunia.com/advisories/26499
http://secunia.com/advisories/28583
http://security.gentoo.org/glsa/glsa-200708-12.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/35205
https://issues.rpath.com/browse/RPL-1498
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10865
http://www.debian.org/security/2007/dsa-1322
http://www.mandriva.com/security/advisories?name=MDKSA-2007:145
http://www.novell.com/linux/security/advisories/2007_15_sr.html
http://www.redhat.com/support/errata/RHSA-2007-0709.html
http://www.redhat.com/support/errata/RHSA-2007-0710.html
http://www.redhat.com/support/errata/RHSA-2008-0059.html
http://www.securityfocus.com/bid/24662
http://www.securitytracker.com/id?1018315
http://www.vupen.com/english/advisories/2007/2353
http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html
http://www.wireshark.org/security/wnpa-sec-2007-02.html
246225 https://bugzilla.redhat.com/show_bug.cgi?id=246225
cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.12:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.14:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.10.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.10.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
CVE-2007-3390 https://nvd.nist.gov/vuln/detail/CVE-2007-3390
GLSA-200708-12 https://security.gentoo.org/glsa/200708-12
RHSA-2007:0709 https://access.redhat.com/errata/RHSA-2007:0709
RHSA-2007:0710 https://access.redhat.com/errata/RHSA-2007:0710
RHSA-2008:0059 https://access.redhat.com/errata/RHSA-2008:0059
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2007-3390
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.80671
EPSS Score 0.01442
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:02:20.632241+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/200708-12 38.0.0