First published: Thu Jul 08 2004(Updated: )
The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ethereal group Ethereal | =0.10.3 | |
Ethereal group Ethereal | =0.10.4 | |
Gentoo Linux | ||
Mandrake Linux | =9.2 | |
Mandrake Linux | =10.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Linux Advanced Workstation | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0633 has been rated with a severity that can lead to a denial of service due to an integer overflow in Ethereal.
To fix CVE-2004-0633, upgrade to a version of Ethereal that is not affected, specifically any version after 0.10.4.
CVE-2004-0633 affects Ethereal versions 0.10.3 and 0.10.4.
CVE-2004-0633 is identified as a denial of service vulnerability due to an integer overflow.
Yes, CVE-2004-0633 can be exploited by remote attackers to cause a process abort.