Ethereal Information for VU#644886

Ethereal fails to properly parse NetFlow UDP packets with an overly large template_entry count

Status

Affected

Vendor Statement

Please see the Ethereal Security Bulletin at http://www.ethereal.com/appnotes/enpa-sa-00013.html.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.