Overview
Ethereal fails to properly parse v9_template structures in NetFlow UDP packets with an overly large template_entry count. This could allow an attacker to execute arbitrary code.
Description
| Ethereal is a network traffic analysis package. It includes the ability to decode packets containing NetFlow data. There is a buffer overflow vulnerability in the way the NetFlow v9 dissector parses v9_template structures in a NetFlow UDP packet. A remote, unauthenticated attacker could exploit this vulnerability by sending a NetFlow UDP packet containing an overly large template_entry count which could allow for arbitrary code execution. | 
Impact
| A remote, unauthenticated attacker could execute arbitrary code on the vulnerable system. | 
Solution
| Upgrade Upgrade to version 0.10.3 or later. | 
| 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Ethereal credits Stefan Esser for reporting this vulnerability.
This document was written by Damon Morda.
Other Information
| CVE IDs: | CVE-2004-0176 | 
| Severity Metric: | 9.82 | 
| Date Public: | 2004-03-22 | 
| Date First Published: | 2004-03-24 | 
| Date Last Updated: | 2004-03-25 16:50 UTC | 
| Document Revision: | 26 |