CVE-2004-0365

The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ethereal:ethereal:*:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References (CONFIRM) http://www.ethereal.com/appnotes/enpa-sa-00013.html - Broken Link (CONFIRM) http://www.ethereal.com/appnotes/enpa-sa-00013.html - Broken Link, URL Repurposed

28 Dec 2023, 15:33

Type Values Removed Values Added
References (SECUNIA) http://secunia.com/advisories/11185 - (SECUNIA) http://secunia.com/advisories/11185 - Broken Link
References (CERT-VN) http://www.kb.cert.org/vuls/id/124454 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/124454 - Third Party Advisory, US Government Resource
References (MLIST) http://marc.info/?l=ethereal-dev&m=107962966700423&w=2 - (MLIST) http://marc.info/?l=ethereal-dev&m=107962966700423&w=2 - Mailing List
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=108058005324316&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=108058005324316&w=2 - Mailing List
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9196 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9196 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15571 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15571 - Third Party Advisory, VDB Entry
References (CONFIRM) http://www.ethereal.com/appnotes/enpa-sa-00013.html - (CONFIRM) http://www.ethereal.com/appnotes/enpa-sa-00013.html - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200403-07.xml - Vendor Advisory (GENTOO) http://security.gentoo.org/glsa/glsa-200403-07.xml - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-137.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-137.html - Broken Link
References (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 - (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A879 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A879 - Broken Link
References (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 - (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 - Third Party Advisory
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=108213710306260&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=108213710306260&w=2 - Mailing List
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A891 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A891 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-136.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-136.html - Broken Link
CPE cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
cpe:2.3:a:ethereal:ethereal:*:*:*:*:*:*:*:*
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
First Time Ethereal
Ethereal ethereal
CWE NVD-CWE-Other CWE-476

Information

Published : 2004-05-04 04:00

Updated : 2024-02-28 10:24


NVD link : CVE-2004-0365

Mitre link : CVE-2004-0365

CVE.ORG link : CVE-2004-0365


JSON object : View

Products Affected

ethereal

  • ethereal
CWE
CWE-476

NULL Pointer Dereference