search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Ethereal crashes when processing malformed RADIUS packets

Vulnerability Note VU#124454

Original Release Date: 2004-03-24 | Last Revised: 2004-04-05

Overview

Ethereal contains a vulnerability in the way it processes Remote Authentication Dial In User Service (RADIUS) packets.

Description

Ethereal is a network traffic analysis package. It includes the ability to decode packets containing RADIUS data. There is a vulnerability that causes Ethereal to crash when processing malformed RADIUS packets.

Impact

A remote, unauthenticated attacker could cause Ethereal to crash.

Solution

Upgrade

Upgrade to version 0.10.3 or later.

Note: Ethereal is considered BETA software at this time.

Vendor Information

124454
 
Affected   Unknown   Unaffected

Ethereal

Updated:  March 24, 2004

Status

  Vulnerable

Vendor Statement

Please see the Ethereal Security Bulletin at http://www.ethereal.com/appnotes/enpa-sa-00013.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

Ethereal credits Jonathan Heussser for reporting this vulnerability.

This document was written by Damon Morda.

Other Information

CVE IDs: None
Severity Metric: 2.21
Date Public: 2004-03-22
Date First Published: 2004-03-24
Date Last Updated: 2004-04-05 18:31 UTC
Document Revision: 15

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.