Vulnerability Name:

CVE-2002-0822 (CCN-9493)

Assigned:2002-06-28
Published:2002-06-28
Updated:2008-09-05
Summary:Ethereal 0.9.4 and earlier allows remote attackers to cause a denial of service and possibly excecute arbitrary code via the (1) SOCKS, (2) RSVP, (3) AFS, or (4) LMP dissectors, which can be caused to core dump.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: FreeBSD Security Notice FreeBSD-SN-02:05
security issues in ports

Source: MITRE
Type: CNA
CVE-2002-0822

Source: CCN
Type: Conectiva Linux Announcement CLSA-2002:505
ethereal

Source: CCN
Type: RHSA-2002-036
Updated ethereal packages available

Source: CCN
Type: RHSA-2002-169
Updated ethereal packages are available

Source: CCN
Type: RHSA-2002-170
ethereal security update

Source: CCN
Type: Ethereal Web site
The Ethereal Network Analyzer

Source: CCN
Type: Ethereal Application Note enpa-sa-00005
Potential issues with Ethereal 0.9.4

Source: CONFIRM
Type: Vendor Advisory
http://www.ethereal.com/appnotes/enpa-sa-00005.html

Source: CCN
Type: BID-5163
Ethereal SOCKS Dissector Memory Corruption Vulnerability

Source: BID
Type: UNKNOWN
5167

Source: CCN
Type: BID-5167
Ethereal AFS Dissector Memory Corruption Vulnerability

Source: XF
Type: UNKNOWN
ethereal-socks-dissector-dos(9493)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ethereal_group:ethereal:*:*:*:*:*:*:*:* (Version <= 0.9.4)

  • Configuration CCN 1:
  • cpe:/a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-0822 (CCN-9494)

    Assigned:2002-06-28
    Published:2002-06-28
    Updated:2002-06-28
    Summary:Ethereal could allow a remote attacker to send malformed data to the RSVP dissector to cause the Ethereal process to crash and core dump.
    CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): None
    Availibility (A): Partial
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: FreeBSD Security Notice FreeBSD-SN-02:05
    security issues in ports

    Source: MITRE
    Type: CNA
    CVE-2002-0822

    Source: CCN
    Type: Conectiva Linux Announcement CLSA-2002:505
    ethereal

    Source: CCN
    Type: RHSA-2002-036
    Updated ethereal packages available

    Source: CCN
    Type: RHSA-2002-169
    Updated ethereal packages are available

    Source: CCN
    Type: RHSA-2002-170
    ethereal security update

    Source: CCN
    Type: Ethereal Web site
    The Ethereal Network Analyzer

    Source: CCN
    Type: Ethereal Application Note enpa-sa-00005
    Potential issues with Ethereal 0.9.4

    Source: CCN
    Type: BID-5165
    Ethereal RSVP Dissector Memory Corruption Vulnerability

    Source: CCN
    Type: BID-5167
    Ethereal AFS Dissector Memory Corruption Vulnerability

    Source: XF
    Type: UNKNOWN
    ethereal-rsvp-dissector-dos(9494)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-0822 (CCN-9495)

    Assigned:2002-06-28
    Published:2002-06-28
    Updated:2008-09-05
    Summary:Ethereal 0.9.4 and earlier allows remote attackers to cause a denial of service and possibly excecute arbitrary code via the (1) SOCKS, (2) RSVP, (3) AFS, or (4) LMP dissectors, which can be caused to core dump.
    CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): None
    Availibility (A): Partial
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: FreeBSD Security Notice FreeBSD-SN-02:05
    security issues in ports

    Source: MITRE
    Type: CNA
    CVE-2002-0822

    Source: CCN
    Type: Conectiva Linux Announcement CLSA-2002:505
    ethereal

    Source: CCN
    Type: RHSA-2002-036
    Updated ethereal packages available

    Source: CCN
    Type: RHSA-2002-169
    Updated ethereal packages are available

    Source: CCN
    Type: RHSA-2002-170
    ethereal security update

    Source: CCN
    Type: Ethereal Web site
    The Ethereal Network Analyzer

    Source: CCN
    Type: Ethereal Application Note enpa-sa-00005
    Potential issues with Ethereal 0.9.4

    Source: CCN
    Type: BID-5167
    Ethereal AFS Dissector Memory Corruption Vulnerability

    Source: XF
    Type: UNKNOWN
    ethereal-afs-dissector-dos(9495)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-0822 (CCN-9496)

    Assigned:2002-06-28
    Published:2002-06-28
    Updated:2002-06-28
    Summary:Ethereal could allow a remote attacker to send malformed data to the LMP dissector to cause the Ethereal process to crash and core dump.
    CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): None
    Availibility (A): Partial
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: FreeBSD Security Notice FreeBSD-SN-02:05
    security issues in ports

    Source: MITRE
    Type: CNA
    CVE-2002-0822

    Source: CCN
    Type: Conectiva Linux Announcement CLSA-2002:505
    ethereal

    Source: CCN
    Type: RHSA-2002-036
    Updated ethereal packages available

    Source: CCN
    Type: RHSA-2002-169
    Updated ethereal packages are available

    Source: CCN
    Type: RHSA-2002-170
    ethereal security update

    Source: CCN
    Type: Ethereal Web site
    The Ethereal Network Analyzer

    Source: CCN
    Type: Ethereal Application Note enpa-sa-00005
    Potential issues with Ethereal 0.9.4

    Source: CCN
    Type: BID-5166
    Ethereal LMP Dissector Memory Corruption Vulnerability

    Source: CCN
    Type: BID-5167
    Ethereal AFS Dissector Memory Corruption Vulnerability

    Source: XF
    Type: UNKNOWN
    ethereal-lmp-dissector-dos(9496)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ethereal_group ethereal *
    ethereal_group ethereal 0.9.4
    freebsd ports collection *
    redhat linux 7
    conectiva linux 6.0
    redhat linux 7.1
    conectiva linux 7.0
    redhat linux 7.2
    redhat linux powertools 6.2
    redhat linux powertools 7.0
    conectiva linux 8.0
    redhat linux 7.3
    redhat enterprise linux 2.1
    ethereal_group ethereal 0.9.4
    freebsd ports collection *
    redhat linux 7
    conectiva linux 6.0
    redhat linux 7.1
    conectiva linux 7.0
    redhat linux 7.2
    redhat linux powertools 6.2
    redhat linux powertools 7.0
    conectiva linux 8.0
    redhat linux 7.3
    redhat enterprise linux 2.1
    ethereal_group ethereal 0.9.4
    freebsd ports collection *
    redhat linux 7
    conectiva linux 6.0
    redhat linux 7.1
    conectiva linux 7.0
    redhat linux 7.2
    redhat linux powertools 6.2
    redhat linux powertools 7.0
    conectiva linux 8.0
    redhat linux 7.3
    redhat enterprise linux 2.1
    ethereal_group ethereal 0.9.4
    freebsd ports collection *
    redhat linux 7
    conectiva linux 6.0
    redhat linux 7.1
    conectiva linux 7.0
    redhat linux 7.2
    redhat linux powertools 6.2
    redhat linux powertools 7.0
    conectiva linux 8.0
    redhat linux 7.3
    redhat enterprise linux 2.1