Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not properly use the tvb_get_nstringz and tvb_get_nstringz0 functions.
References
Link | Resource |
---|---|
http://www.ethereal.com/appnotes/enpa-sa-00009.html | Patch Vendor Advisory |
http://www.debian.org/security/2003/dsa-313 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/641013 | US Government Resource |
http://www.redhat.com/support/errata/RHSA-2003-077.html | |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:067 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A69 |
Configurations
Information
Published : 2003-06-08 21:00
Updated : 2017-10-10 18:29
NVD link : CVE-2003-0356
Mitre link : CVE-2003-0356
JSON object : View
CWE
Products Affected
ethereal_group
- ethereal