First published: Tue Apr 25 2006(Updated: )
Buffer overflow in Ethereal 0.9.15 up to 0.10.14 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the COPS dissector.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ethereal | =0.9.15 | |
Ethereal | =0.9.16 | |
Ethereal | =0.10 | |
Ethereal | =0.10.0 | |
Ethereal | =0.10.0a | |
Ethereal | =0.10.1 | |
Ethereal | =0.10.2 | |
Ethereal | =0.10.3 | |
Ethereal | =0.10.4 | |
Ethereal | =0.10.5 | |
Ethereal | =0.10.6 | |
Ethereal | =0.10.7 | |
Ethereal | =0.10.8 | |
Ethereal | =0.10.9 | |
Ethereal | =0.10.10 | |
Ethereal | =0.10.11 | |
Ethereal | =0.10.12 | |
Ethereal | =0.10.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1935 is classified as a high severity vulnerability due to its ability to cause a denial of service and potential arbitrary code execution.
To fix CVE-2006-1935, upgrade Ethereal to a version above 0.10.14 which has patched the buffer overflow.
CVE-2006-1935 affects Ethereal versions 0.9.15 through 0.10.14.
CVE-2006-1935 can enable remote attackers to exploit the vulnerability for denial of service attacks and potentially gain control over the affected system.
Yes, there are known exploits that can leverage CVE-2006-1935 to exploit the buffer overflow vulnerability.