Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-3651

Опубликовано: 10 дек. 2005
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

РелизСтатусПримечание
dapper

released

0.99.0-1ubuntu1
devel

DNE

edgy

DNE

feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

0.99.3a-1ubuntu1
edgy

released

0.99.3a-1ubuntu1
feisty

released

0.99.3a-1ubuntu1
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 90%
0.05202
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

nvd
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

debian
больше 19 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix func ...

github
больше 3 лет назад

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

EPSS

Процентиль: 90%
0.05202
Низкий

7.5 High

CVSS2