Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-thuh-cnf3-a3ab
Vulnerability ID VCID-thuh-cnf3-a3ab
Aliases CVE-2013-3559
Summary Multiple vulnerabilities have been found in Wireshark, allowing remote attackers to execute arbitrary code or cause Denial of Service.
Status Published
Exploitability 0.5
Weighted Severity 4.5
Risk 2.2
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=48644&r2=48643&pathrev=48644
http://anonsvn.wireshark.org/viewvc?view=revision&revision=48644
http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html
http://rhn.redhat.com/errata/RHSA-2014-0341.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3559.json
https://api.first.org/data/v1/epss?cve=CVE-2013-3559
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8231
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8540
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562
http://secunia.com/advisories/53425
http://secunia.com/advisories/54425
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16228
http://www.debian.org/security/2013/dsa-2700
http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
http://www.wireshark.org/security/wnpa-sec-2013-27.html
709167 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167
965190 https://bugzilla.redhat.com/show_bug.cgi?id=965190
cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
CVE-2013-3559 https://nvd.nist.gov/vuln/detail/CVE-2013-3559
GLSA-201308-05 https://security.gentoo.org/glsa/201308-05
RHSA-2013:1569 https://access.redhat.com/errata/RHSA-2013:1569
RHSA-2014:0341 https://access.redhat.com/errata/RHSA-2014:0341
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-3559
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.89714
EPSS Score 0.05039
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:03:19.600012+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201308-05 38.0.0