ID CVE-2003-0431
Summary The tvb_get_nstringz0 function in Ethereal 0.9.12 and earlier does not properly handle a zero-length buffer size, with unknown consequences.
References
Vulnerable Configurations
  • cpe:2.3:a:ethereal_group:ethereal:*:*:*:*:*:*:*:*
    cpe:2.3:a:ethereal_group:ethereal:*:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 14-02-2024 - 01:17)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
oval via4
accepted 2007-04-25T19:52:11.910-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Jay Beale
    organization Bastille Linux
  • name Thomas R. Jones
    organization Maitreya Security
description The tvb_get_nstringz0 function in Ethereal 0.9.12 and earlier does not properly handle a zero-length buffer size, with unknown consequences.
family unix
id oval:org.mitre.oval:def:101
status accepted
submitted 2003-08-29T12:00:00.000-04:00
title Ethereal 0-Length Buffer Size Vulnerability in tvb_get_nstring0()
version 38
redhat via4
advisories
rhsa
id RHSA-2003:077
refmap via4
conectiva CLA-2003:662
confirm http://www.ethereal.com/appnotes/enpa-sa-00010.html
debian DSA-324
sco CSSA-2003-030.0
secunia 9007
Last major update 14-02-2024 - 01:17
Published 24-07-2003 - 04:00
Last modified 14-02-2024 - 01:17
Back to Top