Vulnerability Note VU#124454

Ethereal crashes when processing malformed RADIUS packets

Original Release date: 24 Mar 2004 | Last revised: 05 Apr 2004


Ethereal contains a vulnerability in the way it processes Remote Authentication Dial In User Service (RADIUS) packets.


Ethereal is a network traffic analysis package. It includes the ability to decode packets containing RADIUS data. There is a vulnerability that causes Ethereal to crash when processing malformed RADIUS packets.


A remote, unauthenticated attacker could cause Ethereal to crash.



Upgrade to version 0.10.3 or later.

Note: Ethereal is considered BETA software at this time.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
EtherealAffected-24 Mar 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Ethereal credits Jonathan Heussser for reporting this vulnerability.

This document was written by Damon Morda.

Other Information

  • CVE IDs: Unknown
  • Date Public: 22 Mar 2004
  • Date First Published: 24 Mar 2004
  • Date Last Updated: 05 Apr 2004
  • Severity Metric: 2.21
  • Document Revision: 15


If you have feedback, comments, or additional information about this vulnerability, please send us email.