Vulnerability Name: | CVE-2003-0356 (CCN-12037) | ||||||||||||||||
Assigned: | 2003-05-01 | ||||||||||||||||
Published: | 2003-05-01 | ||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||
Summary: | Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not properly use the tvb_get_nstringz and tvb_get_nstringz0 functions. | ||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2003-0356 Source: CCN Type: RHSA-2003-077 ethereal security update Source: CCN Type: RHSA-2003-203 Updated Ethereal packages fix security issues Source: DEBIAN Type: Patch, Vendor Advisory DSA-313 Source: DEBIAN Type: DSA-313 ethereal -- buffer overflows Source: CCN Type: Ethereal Web site Off-by-one and integer overflows in Ethereal 0.9.11 Source: CONFIRM Type: Patch, Vendor Advisory http://www.ethereal.com/appnotes/enpa-sa-00009.html Source: CCN Type: US-CERT VU#641013 Ethereal contains multiple one-byte buffer overflows in several dissectors Source: CERT-VN Type: US Government Resource VU#641013 Source: MANDRAKE Type: UNKNOWN MDKSA-2003:067 Source: REDHAT Type: UNKNOWN RHSA-2003:077 Source: CCN Type: BID-7493 Ethereal Multiple Dissector One Byte Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWN ethereal-packet-dissectors-bo(12037) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:69 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |