Overview
Ethereal fails to properly parse v9_template structures in NetFlow UDP packets with an overly large template_entry count. This could allow an attacker to execute arbitrary code.
Description
Ethereal is a network traffic analysis package. It includes the ability to decode packets containing NetFlow data. There is a buffer overflow vulnerability in the way the NetFlow v9 dissector parses v9_template structures in a NetFlow UDP packet. A remote, unauthenticated attacker could exploit this vulnerability by sending a NetFlow UDP packet containing an overly large template_entry count which could allow for arbitrary code execution. |
Impact
A remote, unauthenticated attacker could execute arbitrary code on the vulnerable system. |
Solution
Upgrade Upgrade to version 0.10.3 or later. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Ethereal credits Stefan Esser for reporting this vulnerability.
This document was written by Damon Morda.
Other Information
CVE IDs: | CVE-2004-0176 |
Severity Metric: | 9.82 |
Date Public: | 2004-03-22 |
Date First Published: | 2004-03-24 |
Date Last Updated: | 2004-03-25 16:50 UTC |
Document Revision: | 26 |