The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.gentoo.org/security/en/glsa/glsa-200503-16.xml | vendor-advisory x_refsource_GENTOO |
| http://www.mandriva.com/security/advisories?name=MDKSA-2005:053 | vendor-advisory x_refsource_MANDRAKE |
| http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707 | x_refsource_MISC |
| http://security.lss.hr/index.php?page=details&ID=LSS-2005-03-05 | x_refsource_MISC |
| http://www.ethereal.com/appnotes/enpa-sa-00018.html | x_refsource_CONFIRM |
| http://www.redhat.com/support/errata/RHSA-2005-306.html | vendor-advisory x_refsource_REDHAT |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9687 | vdb-entry signature x_refsource_OVAL |
| http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html | vendor-advisory x_refsource_FEDORA |
| http://www.debian.org/security/2005/dsa-718 | vendor-advisory x_refsource_DEBIAN |
| http://marc.info/?l=bugtraq&m=111066805726551&w=2 | mailing-list x_refsource_BUGTRAQ |
| http://www.securityfocus.com/bid/12762 | vdb-entry x_refsource_BID |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|