Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not properly use the tvb_get_nstringz and tvb_get_nstringz0 functions.
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/641013 | third party advisory us government resource |
http://www.redhat.com/support/errata/RHSA-2003-077.html | vendor advisory broken link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A69 | vdb entry signature broken link |
http://www.ethereal.com/appnotes/enpa-sa-00009.html | patch vendor advisory broken link |
http://www.debian.org/security/2003/dsa-313 | broken link patch vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:067 | third party advisory vendor advisory |