Overview
Ethereal fails to properly parse v9_template structures in NetFlow UDP packets with an overly large template_entry count. This could allow an attacker to execute arbitrary code.
Description
Ethereal is a network traffic analysis package. It includes the ability to decode packets containing NetFlow data. There is a buffer overflow vulnerability in the way the NetFlow v9 dissector parses v9_template structures in a NetFlow UDP packet. A remote, unauthenticated attacker could exploit this vulnerability by sending a NetFlow UDP packet containing an overly large template_entry count which could allow for arbitrary code execution. |
Impact
A remote, unauthenticated attacker could execute arbitrary code on the vulnerable system. |
Solution
Upgrade Upgrade to version 0.10.3 or later. |
|
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
Ethereal credits Stefan Esser for reporting this vulnerability.
This document was written by Damon Morda.
Other Information
| CVE IDs: | CVE-2004-0176 |
| Severity Metric: | 9.82 |
| Date Public: | 2004-03-22 |
| Date First Published: | 2004-03-24 |
| Date Last Updated: | 2004-03-25 16:50 UTC |
| Document Revision: | 26 |