The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.gentoo.org/security/en/glsa/glsa-200503-16.xml | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:053 | vendor advisory |
http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707 | url repurposed |
http://security.lss.hr/index.php?page=details&ID=LSS-2005-03-05 | |
http://www.ethereal.com/appnotes/enpa-sa-00018.html | patch url repurposed |
http://www.redhat.com/support/errata/RHSA-2005-306.html | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9687 | signature vdb entry |
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html | vendor advisory |
http://www.debian.org/security/2005/dsa-718 | patch vendor advisory |
http://marc.info/?l=bugtraq&m=111066805726551&w=2 | mailing list |
http://www.securityfocus.com/bid/12762 | vdb entry |