CVE-2004-0635

The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
http://secunia.com/advisories/12024
http://securitytracker.com/id?1010655
http://www.debian.org/security/2004/dsa-528
http://www.ethereal.com/appnotes/enpa-sa-00015.html URL Repurposed
http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/835846 US Government Resource
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067 Patch Vendor Advisory
http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html Patch Vendor Advisory
http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-378.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/16632
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
http://secunia.com/advisories/12024
http://securitytracker.com/id?1010655
http://www.debian.org/security/2004/dsa-528
http://www.ethereal.com/appnotes/enpa-sa-00015.html URL Repurposed
http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/835846 US Government Resource
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067 Patch Vendor Advisory
http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html Patch Vendor Advisory
http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-378.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/16632
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.16:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.17:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:as:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381 -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 -
References () http://secunia.com/advisories/12024 - () http://secunia.com/advisories/12024 -
References () http://securitytracker.com/id?1010655 - () http://securitytracker.com/id?1010655 -
References () http://www.debian.org/security/2004/dsa-528 - () http://www.debian.org/security/2004/dsa-528 -
References () http://www.ethereal.com/appnotes/enpa-sa-00015.html - URL Repurposed () http://www.ethereal.com/appnotes/enpa-sa-00015.html - URL Repurposed
References () http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/835846 - US Government Resource () http://www.kb.cert.org/vuls/id/835846 - US Government Resource
References () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067 - Patch, Vendor Advisory () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067 - Patch, Vendor Advisory
References () http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html - Patch, Vendor Advisory () http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html - Patch, Vendor Advisory
References () http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html - Patch, Vendor Advisory () http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2004-378.html - () http://www.redhat.com/support/errata/RHSA-2004-378.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16632 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16632 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References (CONFIRM) http://www.ethereal.com/appnotes/enpa-sa-00015.html - (CONFIRM) http://www.ethereal.com/appnotes/enpa-sa-00015.html - URL Repurposed

Information

Published : 2004-12-06 05:00

Updated : 2025-04-03 01:03


NVD link : CVE-2004-0635

Mitre link : CVE-2004-0635

CVE.ORG link : CVE-2004-0635


JSON object : View

Products Affected

mandrakesoft

  • mandrake_linux

ethereal_group

  • ethereal

redhat

  • linux_advanced_workstation
  • enterprise_linux

gentoo

  • linux