Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7954-wg84-v522

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.

Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.

EPSS

Процентиль: 87%
0.03527
Низкий

Связанные уязвимости

ubuntu
почти 21 год назад

Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.

redhat
почти 21 год назад

Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.

nvd
почти 21 год назад

Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.

debian
почти 21 год назад

Multiple buffer overflows in the dissect_a11_radius function in the CD ...

EPSS

Процентиль: 87%
0.03527
Низкий