Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.
References
Configurations
Configuration 1 (hide)
|
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://www.ethereal.com/appnotes/enpa-sa-00022.html - URL Repurposed | |
References | (MISC) http://anonsvn.ethereal.com/viewcvs/viewcvs.py/trunk/epan/dissectors/packet-ospf.c - URL Repurposed |
Information
Published : 2005-12-10 11:03
Updated : 2024-02-14 01:17
NVD link : CVE-2005-3651
Mitre link : CVE-2005-3651
JSON object : View
Products Affected
ethereal_group
- ethereal
CWE