Upstream information

CVE-2005-3651 at MITRE

Description

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 138497 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • ethereal >= 0.10.13-10
ul1.x86-64
slrs8.x86
ul1.s390
core9.ppc
sles9-nlpos.x86
ul1.ia64
YOU Patch Nr: 10851
Open Enterprise Server
  • ethereal >= 0.10.13-2.9
ul1.x86-64
slrs8.x86
ul1.s390
core9.ppc
sles9-nlpos.x86
ul1.ia64
YOU Patch Nr: 10851
SUSE LINUX 10.0
SUSE LINUX 9.2
SUSE LINUX 9.3
  • ethereal >= 0.10.13-2.4
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • ethereal >= 0.10.13-2.9