Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5c39-44xr-89vv

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

EPSS

Процентиль: 90%
0.05202
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

redhat
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

nvd
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

debian
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix func ...

EPSS

Процентиль: 90%
0.05202
Низкий