The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000474 - | |
References | () http://www.debian.org/security/2002/dsa-130 - | |
References | () http://www.ethereal.com/appnotes/enpa-sa-00003.html - URL Repurposed | |
References | () http://www.iss.net/security_center/static/8952.php - | |
References | () http://www.redhat.com/support/errata/RHSA-2002-088.html - | |
References | () http://www.securityfocus.com/bid/4604 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://www.ethereal.com/appnotes/enpa-sa-00003.html - URL Repurposed |
Information
Published : 2002-06-25 04:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0353
Mitre link : CVE-2002-0353
CVE.ORG link : CVE-2002-0353
JSON object : View
Products Affected
ethereal_group
- ethereal
CWE