Vulnerability Name: | CVE-2002-0402 (CCN-9203) | ||||||||
Assigned: | 2002-05-19 | ||||||||
Published: | 2002-05-19 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | Buffer overflow in X11 dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code while Ethereal is parsing keysyms. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CALDERA Type: UNKNOWN CSSA-2002-037.0 Source: CCN Type: SCO Security Advisory CSSA-2002-037.0 Linux: various packet handling vunerabilities in ethereal Source: MITRE Type: CNA CVE-2002-0402 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:505 ethereal Source: CONECTIVA Type: UNKNOWN CLSA-2002:505 Source: BUGTRAQ Type: UNKNOWN 20020529 Potential security issues in Ethereal Source: CCN Type: RHSA-2002-036 Updated ethereal packages available Source: CCN Type: RHSA-2002-088 Updated ethereal packages are available Source: CCN Type: RHSA-2002-170 ethereal security update Source: DEBIAN Type: Patch, Vendor Advisory DSA-130 Source: DEBIAN Type: DSA-130 ethereal -- remotely triggered memory allocation error Source: CCN Type: Ethereal Web site The Ethereal Network Analyzer Source: CCN Type: Ethereal Application Note enpa-sa-00004 Potential issues with Ethereal 0.9.3 Source: CONFIRM Type: Patch, Vendor Advisory http://www.ethereal.com/appnotes/enpa-sa-00004.html Source: XF Type: UNKNOWN ethereal-x11-dissector-bo(9203) Source: REDHAT Type: UNKNOWN RHSA-2002:036 Source: REDHAT Type: UNKNOWN RHSA-2002:088 Source: REDHAT Type: UNKNOWN RHSA-2002:170 Source: BID Type: UNKNOWN 4805 Source: CCN Type: BID-4805 Ethereal X11 Dissector Buffer Overflow Vulnerability Source: XF Type: UNKNOWN ethereal-x11-dissector-bo(9203) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |