Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2005-3651

Опубликовано: 09 дек. 2005
Источник: redhat
EPSS Низкий

Описание

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

Дополнительная информация

Статус:

Moderate

EPSS

Процентиль: 90%
0.05202
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

nvd
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

debian
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix func ...

github
больше 3 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

EPSS

Процентиль: 90%
0.05202
Низкий