CVE-2004-0176

Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835
http://marc.info/?l=bugtraq&m=108007072215742&w=2
http://marc.info/?l=bugtraq&m=108058005324316&w=2
http://marc.info/?l=bugtraq&m=108213710306260&w=2
http://secunia.com/advisories/11185
http://security.e-matters.de/advisories/032004.html
http://security.gentoo.org/glsa/glsa-200403-07.xml
http://www.debian.org/security/2004/dsa-511 Patch Vendor Advisory
http://www.ethereal.com/appnotes/enpa-sa-00013.html URL Repurposed
http://www.kb.cert.org/vuls/id/119876 US Government Resource
http://www.kb.cert.org/vuls/id/125156 US Government Resource
http://www.kb.cert.org/vuls/id/433596 US Government Resource
http://www.kb.cert.org/vuls/id/591820 US Government Resource
http://www.kb.cert.org/vuls/id/644886 US Government Resource
http://www.kb.cert.org/vuls/id/659140 US Government Resource
http://www.kb.cert.org/vuls/id/740188 US Government Resource
http://www.kb.cert.org/vuls/id/864884 US Government Resource
http://www.kb.cert.org/vuls/id/931588 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2004:024
http://www.osvdb.org/6893
http://www.redhat.com/support/errata/RHSA-2004-136.html
http://www.redhat.com/support/errata/RHSA-2004-137.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/15569
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10187
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835
http://marc.info/?l=bugtraq&m=108007072215742&w=2
http://marc.info/?l=bugtraq&m=108058005324316&w=2
http://marc.info/?l=bugtraq&m=108213710306260&w=2
http://secunia.com/advisories/11185
http://security.e-matters.de/advisories/032004.html
http://security.gentoo.org/glsa/glsa-200403-07.xml
http://www.debian.org/security/2004/dsa-511 Patch Vendor Advisory
http://www.ethereal.com/appnotes/enpa-sa-00013.html URL Repurposed
http://www.kb.cert.org/vuls/id/119876 US Government Resource
http://www.kb.cert.org/vuls/id/125156 US Government Resource
http://www.kb.cert.org/vuls/id/433596 US Government Resource
http://www.kb.cert.org/vuls/id/591820 US Government Resource
http://www.kb.cert.org/vuls/id/644886 US Government Resource
http://www.kb.cert.org/vuls/id/659140 US Government Resource
http://www.kb.cert.org/vuls/id/740188 US Government Resource
http://www.kb.cert.org/vuls/id/864884 US Government Resource
http://www.kb.cert.org/vuls/id/931588 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2004:024
http://www.osvdb.org/6893
http://www.redhat.com/support/errata/RHSA-2004-136.html
http://www.redhat.com/support/errata/RHSA-2004-137.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/15569
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10187
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:47

Type Values Removed Values Added
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 -
References () http://marc.info/?l=bugtraq&m=108007072215742&w=2 - () http://marc.info/?l=bugtraq&m=108007072215742&w=2 -
References () http://marc.info/?l=bugtraq&m=108058005324316&w=2 - () http://marc.info/?l=bugtraq&m=108058005324316&w=2 -
References () http://marc.info/?l=bugtraq&m=108213710306260&w=2 - () http://marc.info/?l=bugtraq&m=108213710306260&w=2 -
References () http://secunia.com/advisories/11185 - () http://secunia.com/advisories/11185 -
References () http://security.e-matters.de/advisories/032004.html - () http://security.e-matters.de/advisories/032004.html -
References () http://security.gentoo.org/glsa/glsa-200403-07.xml - () http://security.gentoo.org/glsa/glsa-200403-07.xml -
References () http://www.debian.org/security/2004/dsa-511 - Patch, Vendor Advisory () http://www.debian.org/security/2004/dsa-511 - Patch, Vendor Advisory
References () http://www.ethereal.com/appnotes/enpa-sa-00013.html - URL Repurposed () http://www.ethereal.com/appnotes/enpa-sa-00013.html - URL Repurposed
References () http://www.kb.cert.org/vuls/id/119876 - US Government Resource () http://www.kb.cert.org/vuls/id/119876 - US Government Resource
References () http://www.kb.cert.org/vuls/id/125156 - US Government Resource () http://www.kb.cert.org/vuls/id/125156 - US Government Resource
References () http://www.kb.cert.org/vuls/id/433596 - US Government Resource () http://www.kb.cert.org/vuls/id/433596 - US Government Resource
References () http://www.kb.cert.org/vuls/id/591820 - US Government Resource () http://www.kb.cert.org/vuls/id/591820 - US Government Resource
References () http://www.kb.cert.org/vuls/id/644886 - US Government Resource () http://www.kb.cert.org/vuls/id/644886 - US Government Resource
References () http://www.kb.cert.org/vuls/id/659140 - US Government Resource () http://www.kb.cert.org/vuls/id/659140 - US Government Resource
References () http://www.kb.cert.org/vuls/id/740188 - US Government Resource () http://www.kb.cert.org/vuls/id/740188 - US Government Resource
References () http://www.kb.cert.org/vuls/id/864884 - US Government Resource () http://www.kb.cert.org/vuls/id/864884 - US Government Resource
References () http://www.kb.cert.org/vuls/id/931588 - US Government Resource () http://www.kb.cert.org/vuls/id/931588 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 -
References () http://www.osvdb.org/6893 - () http://www.osvdb.org/6893 -
References () http://www.redhat.com/support/errata/RHSA-2004-136.html - () http://www.redhat.com/support/errata/RHSA-2004-136.html -
References () http://www.redhat.com/support/errata/RHSA-2004-137.html - () http://www.redhat.com/support/errata/RHSA-2004-137.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15569 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15569 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10187 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10187 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://www.ethereal.com/appnotes/enpa-sa-00013.html - () http://www.ethereal.com/appnotes/enpa-sa-00013.html - URL Repurposed

Information

Published : 2004-05-04 04:00

Updated : 2024-11-20 23:47


NVD link : CVE-2004-0176

Mitre link : CVE-2004-0176

CVE.ORG link : CVE-2004-0176


JSON object : View

Products Affected

ethereal_group

  • ethereal