Vulnerability Note VU#740188

Ethereal IrDA dissector plugin fails to properly parse IRCOM_PORT_NAME parameter

Original Release date: 25 Mar 2004 | Last revised: 06 Apr 2004

Overview

Ethereal contains a vulnerability in the way the Infrared Data Association (IrDA) dissector plugin parses the IRCOM_PORT_NAME parameter.

Description

Ethereal is a network traffic analysis package. It includes the ability to decode packets containing IrDA data. There is a vulnerability in the way the IrDA dissector plugin decodes the IRCOM_PORT_NAME parameter. By sending an IrDA packet containing an overly long portname, a remote unauthenticated attacker could cause Ethereal to crash or potentially execute code of the attacker's choice.

Impact

A remote, unauthenticated attacker could cause Ethereal to crash or potentially execute code of the attacker's choice.

Solution

Upgrade

Upgrade to version 0.10.3 or later.

Note: Ethereal is considered BETA software at this time.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
EtherealAffected-25 Mar 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Ethereal credits Stefan Esser for reporting this vulnerability.

This document was written by Damon Morda.

Other Information

  • CVE IDs: CAN-2004-0176
  • Date Public: 22 Mar 2004
  • Date First Published: 25 Mar 2004
  • Date Last Updated: 06 Apr 2004
  • Severity Metric: 4.04
  • Document Revision: 11

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.