Vulnerability Name: CVE-2005-1468 (CCN-20464) Assigned: 2005-05-04 Published: 2005-05-04 Updated: 2017-10-11 Summary: Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-1459 Source: MITRE Type: CNACVE-2005-1468 Source: CONECTIVA Type: UNKNOWNCLSA-2005:963 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:963Fixes for miltiple security vulnerabilities in ethereal Source: CCN Type: RHSA-2005-427ethereal security update Source: CCN Type: Ethereal, a network protocol analyzerEthereal- The world's most popular network protocol analyzer Source: CCN Type: Ethereal Security Advisory #19 enpa-sa-00019Multiple problems in Ethereal versions 0.8.14 to 0.10.10 Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.ethereal.com/appnotes/enpa-sa-00019.html Source: CCN Type: Ethereal- DownloadEthereal Download page Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.ethereal.com/news/item_20050504_01.html Source: CCN Type: GLSA-200505-03Ethereal: Numerous vulnerabilities Source: FEDORA Type: Patch, Vendor AdvisoryFLSA-2006:152922 Source: REDHAT Type: Patch, Vendor AdvisoryRHSA-2005:427 Source: BID Type: Exploit, Patch13504 Source: CCN Type: BID-13504Ethereal Multiple Remote Protocol Dissector Vulnerabilities Source: XF Type: UNKNOWNethereal-wsp-dissector-dos(20464) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10049 Vulnerable Configuration: Configuration 1 :cpe:/a:ethereal_group:ethereal:0.8:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:* OR cpe:/a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2005-1468 (CCN-20475) Assigned: 2005-05-04 Published: 2005-05-04 Updated: 2005-05-04 Summary: Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-1459 Source: MITRE Type: CNACVE-2005-1468 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:963Fixes for miltiple security vulnerabilities in ethereal Source: CCN Type: RHSA-2005-427ethereal security update Source: CCN Type: Ethereal, a network protocol analyzerEthereal- The world's most popular network protocol analyzer Source: CCN Type: Ethereal Security Advisory #19 enpa-sa-00019Multiple problems in Ethereal versions 0.8.14 to 0.10.10 Source: CCN Type: Ethereal- DownloadEthereal Download page Source: CCN Type: GLSA-200505-03Ethereal: Numerous vulnerabilities Source: CCN Type: BID-13504Ethereal Multiple Remote Protocol Dissector Vulnerabilities Source: XF Type: UNKNOWNethereal-smb-mailslot-dissector-dos(20475) Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2005-1468 (CCN-20476) Assigned: 2005-05-04 Published: 2005-05-04 Updated: 2005-05-04 Summary: Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-1468 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:963Fixes for miltiple security vulnerabilities in ethereal Source: CCN Type: RHSA-2005-427ethereal security update Source: CCN Type: Ethereal, a network protocol analyzerEthereal- The world's most popular network protocol analyzer Source: CCN Type: Ethereal Security Advisory #19 enpa-sa-00019Multiple problems in Ethereal versions 0.8.14 to 0.10.10 Source: CCN Type: Ethereal- DownloadEthereal Download page Source: CCN Type: GLSA-200505-03Ethereal: Numerous vulnerabilities Source: CCN Type: BID-13504Ethereal Multiple Remote Protocol Dissector Vulnerabilities Source: XF Type: UNKNOWNethereal-h245-dissector-dos(20476) Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:* AND cpe:/o:suse:suse_linux:*:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2005-1468 (CCN-20488) Assigned: 2005-05-04 Published: 2005-05-04 Updated: 2005-05-04 Summary: Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-1464 Source: MITRE Type: CNACVE-2005-1468 Source: MITRE Type: CNACVE-2005-1470 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:963Fixes for miltiple security vulnerabilities in ethereal Source: CCN Type: RHSA-2005-427ethereal security update Source: CCN Type: Ethereal, a network protocol analyzerEthereal- The world's most popular network protocol analyzer Source: CCN Type: Ethereal Security Advisory #19 enpa-sa-00019Multiple problems in Ethereal versions 0.8.14 to 0.10.10 Source: CCN Type: Ethereal- DownloadEthereal Download page Source: CCN Type: GLSA-200505-03Ethereal: Numerous vulnerabilities Source: CCN Type: BID-13504Ethereal Multiple Remote Protocol Dissector Vulnerabilities Source: XF Type: UNKNOWNethereal-mgcp-dissector-dos(20488) Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2005-1468 (CCN-20518) Assigned: 2005-05-04 Published: 2005-05-04 Updated: 2005-05-04 Summary: Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-1461 Source: MITRE Type: CNACVE-2005-1468 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:963Fixes for miltiple security vulnerabilities in ethereal Source: CCN Type: RHSA-2005-427ethereal security update Source: CCN Type: Ethereal, a network protocol analyzerEthereal- The world's most popular network protocol analyzer Source: CCN Type: Ethereal Security Advisory #19 enpa-sa-00019Multiple problems in Ethereal versions 0.8.14 to 0.10.10 Source: CCN Type: Ethereal- DownloadEthereal Download page Source: CCN Type: GLSA-200505-03Ethereal: Numerous vulnerabilities Source: CCN Type: BID-13504Ethereal Multiple Remote Protocol Dissector Vulnerabilities Source: XF Type: UNKNOWNethereal-q931-dissector-dos(20518) Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:* AND cpe:/o:suse:suse_linux:*:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2005-1468 (CCN-20524) Assigned: 2005-05-04 Published: 2005-05-04 Updated: 2005-05-04 Summary: Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-1468 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:963Fixes for miltiple security vulnerabilities in ethereal Source: CCN Type: RHSA-2005-427ethereal security update Source: CCN Type: Ethereal, a network protocol analyzerEthereal- The world's most popular network protocol analyzer Source: CCN Type: Ethereal Security Advisory #19 enpa-sa-00019Multiple problems in Ethereal versions 0.8.14 to 0.10.10 Source: CCN Type: Ethereal- DownloadEthereal Download page Source: CCN Type: GLSA-200505-03Ethereal: Numerous vulnerabilities Source: CCN Type: BID-13504Ethereal Multiple Remote Protocol Dissector Vulnerabilities Source: XF Type: UNKNOWNethereal-rpc-dissector-dos(20524) Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2005-1468 (CCN-20547) Assigned: 2005-05-04 Published: 2005-05-04 Updated: 2017-10-11 Summary: Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2005-1459 Source: MITRE Type: CNACVE-2005-1468 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2005:963Fixes for miltiple security vulnerabilities in ethereal Source: CCN Type: RHSA-2005-427ethereal security update Source: CCN Type: Ethereal, a network protocol analyzerEthereal- The world's most popular network protocol analyzer Source: CCN Type: Ethereal Security Advisory #19 enpa-sa-00019Ethereal: Numerous vulnerabilities Source: CCN Type: Ethereal- DownloadEthereal Download page Source: CCN Type: GLSA-200505-03Ethereal: Numerous vulnerabilities Source: CCN Type: BID-13504Ethereal Multiple Remote Protocol Dissector Vulnerabilities Source: XF Type: UNKNOWNethereal-smb-netlogon-dissector-dos(20547) Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:10049 V Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference. 2013-04-29 oval:com.redhat.rhsa:def:20050427 P RHSA-2005:427: ethereal security update (Moderate) 2005-05-24
BACK
ethereal_group ethereal 0.8
ethereal_group ethereal 0.8.13
ethereal_group ethereal 0.8.14
ethereal_group ethereal 0.8.15
ethereal_group ethereal 0.8.18
ethereal_group ethereal 0.8.19
ethereal_group ethereal 0.9
ethereal_group ethereal 0.9.1
ethereal_group ethereal 0.9.2
ethereal_group ethereal 0.9.3
ethereal_group ethereal 0.9.4
ethereal_group ethereal 0.9.5
ethereal_group ethereal 0.9.6
ethereal_group ethereal 0.9.7
ethereal_group ethereal 0.9.8
ethereal_group ethereal 0.9.9
ethereal_group ethereal 0.9.10
ethereal_group ethereal 0.9.11
ethereal_group ethereal 0.9.12
ethereal_group ethereal 0.9.13
ethereal_group ethereal 0.9.14
ethereal_group ethereal 0.9.15
ethereal_group ethereal 0.9.16
ethereal_group ethereal 0.10
ethereal_group ethereal 0.10.1
ethereal_group ethereal 0.10.2
ethereal_group ethereal 0.10.3
ethereal_group ethereal 0.10.4
ethereal_group ethereal 0.10.5
ethereal_group ethereal 0.10.6
ethereal_group ethereal 0.10.7
ethereal_group ethereal 0.10.8
ethereal_group ethereal 0.10.9
ethereal_group ethereal 0.10.10
ethereal_group ethereal 0.10.10
suse suse linux *
gentoo linux *
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
conectiva linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
conectiva linux 10
mandrakesoft mandrake linux 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 10.1
ethereal_group ethereal 0.10.10
suse suse linux *
gentoo linux *
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
conectiva linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
conectiva linux 10
mandrakesoft mandrake linux 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 10.1