search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Ethereal crashes when processing malformed RADIUS packets

Vulnerability Note VU#124454

Original Release Date: 2004-03-24 | Last Revised: 2004-04-05


Ethereal contains a vulnerability in the way it processes Remote Authentication Dial In User Service (RADIUS) packets.


Ethereal is a network traffic analysis package. It includes the ability to decode packets containing RADIUS data. There is a vulnerability that causes Ethereal to crash when processing malformed RADIUS packets.


A remote, unauthenticated attacker could cause Ethereal to crash.



Upgrade to version 0.10.3 or later.

Note: Ethereal is considered BETA software at this time.

Vendor Information

Affected   Unknown   Unaffected


Updated:  March 24, 2004



Vendor Statement

Please see the Ethereal Security Bulletin at

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



Ethereal credits Jonathan Heussser for reporting this vulnerability.

This document was written by Damon Morda.

Other Information

CVE IDs: None
Severity Metric: 2.21
Date Public: 2004-03-22
Date First Published: 2004-03-24
Date Last Updated: 2004-04-05 18:31 UTC
Document Revision: 15

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.