Vulnerability Details : CVE-2004-0365
The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2004-0365
Probability of exploitation activity in the next 30 days: 2.87%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0365
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
[email protected] |
References for CVE-2004-0365
-
http://www.kb.cert.org/vuls/id/124454
US Government Resource
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835
-
http://marc.info/?l=ethereal-dev&m=107962966700423&w=2
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:024
- http://www.redhat.com/support/errata/RHSA-2004-136.html
- http://www.redhat.com/support/errata/RHSA-2004-137.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9196
- http://marc.info/?l=bugtraq&m=108213710306260&w=2
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/15571
- http://marc.info/?l=bugtraq&m=108058005324316&w=2
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A891
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A879
- http://www.ethereal.com/appnotes/enpa-sa-00013.html
-
http://security.gentoo.org/glsa/glsa-200403-07.xml
Vendor Advisory
Products affected by CVE-2004-0365
- cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*
- cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*