Vulnerability Details : CVE-2004-0176
Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2004-0176
- cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0176
68.69%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0176
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2004-0176
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835
CONECTIVA | Análises dos Melhores Produtos Online (#10 Melhores)
-
http://www.kb.cert.org/vuls/id/644886
US Government Resource
-
http://www.kb.cert.org/vuls/id/740188
US Government Resource
-
http://www.kb.cert.org/vuls/id/931588
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/15569
-
http://www.kb.cert.org/vuls/id/591820
US Government Resource
-
http://www.mandriva.com/security/advisories?name=MDKSA-2004:024
Advisories - Mandriva Linux
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887
-
http://www.debian.org/security/2004/dsa-511
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2004-136.html
Support
-
http://www.redhat.com/support/errata/RHSA-2004-137.html
Support
-
http://www.kb.cert.org/vuls/id/864884
US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10187
-
http://marc.info/?l=bugtraq&m=108007072215742&w=2
-
http://security.e-matters.de/advisories/032004.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878
-
http://www.kb.cert.org/vuls/id/119876
US Government Resource
-
http://marc.info/?l=bugtraq&m=108213710306260&w=2
'[OpenPKG-SA-2004.015] OpenPKG Security Advisory (ethereal)' - MARC
-
http://www.kb.cert.org/vuls/id/125156
US Government Resource
-
http://marc.info/?l=bugtraq&m=108058005324316&w=2
'LNSA-#2004-0007: Multiple security problems in Ethereal' - MARC
-
http://www.kb.cert.org/vuls/id/433596
US Government Resource
-
http://www.kb.cert.org/vuls/id/659140
US Government Resource
-
http://www.ethereal.com/appnotes/enpa-sa-00013.html
** Not Found **
-
http://security.gentoo.org/glsa/glsa-200403-07.xml
Multiple remote overflows and vulnerabilities in Ethereal (GLSA 200403-07) — Gentoo security
Jump to