Vulnerability Note VU#740188
Ethereal IrDA dissector plugin fails to properly parse IRCOM_PORT_NAME parameter
Ethereal contains a vulnerability in the way the Infrared Data Association (IrDA) dissector plugin parses the IRCOM_PORT_NAME parameter.
Ethereal is a network traffic analysis package. It includes the ability to decode packets containing IrDA data. There is a vulnerability in the way the IrDA dissector plugin decodes the IRCOM_PORT_NAME parameter. By sending an IrDA packet containing an overly long portname, a remote unauthenticated attacker could cause Ethereal to crash or potentially execute code of the attacker's choice.
A remote, unauthenticated attacker could cause Ethereal to crash or potentially execute code of the attacker's choice.
Upgrade to version 0.10.3 or later.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Ethereal||Affected||-||25 Mar 2004|
CVSS Metrics (Learn More)
Ethereal credits Stefan Esser for reporting this vulnerability.
This document was written by Damon Morda.
- CVE IDs: CAN-2004-0176
- Date Public: 22 Mar 2004
- Date First Published: 25 Mar 2004
- Date Last Updated: 06 Apr 2004
- Severity Metric: 4.04
- Document Revision: 11
If you have feedback, comments, or additional information about this vulnerability, please send us email.