Overview
Ethereal is a network traffic analysis package. Several packet dissectors contain a vulnerability that may cause a denial-of-service situation.
Description
| Several packet dissectors for Ethereal contain a one-byte buffer overflow vulnerability. According to the Ethereal Advisory, tvb_get_nstringz() and tvb_get_nstringz0() were used in an unsafe manner. Versions 0.9.11 and earlier of dissectors for AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3, Rsync, SMB, SMPP, and TSP are affected. | 
Impact
| It may be possible for a remote attacker to crash the program or run arbitrary code on the system via a crafted packet. | 
Solution
| Upgrade to version 0.9.12 which resolves this issue. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Thanks to Timo Sirainen for reporting this vulnerability.
This document was written by Jason A Rafail and is based upon information in the Ethereal Advisory.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 5.99 | 
| Date Public: | 2003-05-01 | 
| Date First Published: | 2003-05-12 | 
| Date Last Updated: | 2004-08-19 15:29 UTC | 
| Document Revision: | 13 |