Vulnerability Details : CVE-2003-0925
Buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed GTP MSISDN string.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2003-0925
- cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0925
2.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0925
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-0925
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:114
-
http://www.securityfocus.com/bid/8951
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2003-323.html
Patch;Vendor Advisory
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000780
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9692
-
http://www.redhat.com/support/errata/RHSA-2003-324.html
-
http://www.turbolinux.com/security/TLSA-2003-64.txt
-
http://www.ethereal.com/appnotes/enpa-sa-00011.html
Patch;Vendor Advisory
-
http://www.debian.org/security/2003/dsa-407
Debian -- The Universal Operating System
Jump to