Overview
Ethereal is a network traffic analysis package. Several packet dissectors contain a vulnerability that may cause a denial-of-service situation.
Description
Several packet dissectors for Ethereal contain a one-byte buffer overflow vulnerability. According to the Ethereal Advisory, tvb_get_nstringz() and tvb_get_nstringz0() were used in an unsafe manner. Versions 0.9.11 and earlier of dissectors for AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3, Rsync, SMB, SMPP, and TSP are affected. |
Impact
It may be possible for a remote attacker to crash the program or run arbitrary code on the system via a crafted packet. |
Solution
Upgrade to version 0.9.12 which resolves this issue. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Timo Sirainen for reporting this vulnerability.
This document was written by Jason A Rafail and is based upon information in the Ethereal Advisory.
Other Information
CVE IDs: | None |
Severity Metric: | 5.99 |
Date Public: | 2003-05-01 |
Date First Published: | 2003-05-12 |
Date Last Updated: | 2004-08-19 15:29 UTC |
Document Revision: | 13 |