5
CVSSv2

CVE-2005-1470

Published: 05/05/2005 Updated: 14/02/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Multiple unknown vulnerabilities in the (1) TZSP, (2) MGCP, (3) ISUP, (4) SMB, or (5) Bittorrent dissectors in Ethereal prior to 0.10.11 allow remote malicious users to cause a denial of service (segmentation fault) via unknown vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

ethereal group ethereal 0.10.1

ethereal group ethereal 0.8

ethereal group ethereal 0.9.2

ethereal group ethereal 0.9.6

ethereal group ethereal 0.10.10

ethereal group ethereal 0.9.5

ethereal group ethereal 0.8.19

ethereal group ethereal 0.10.2

ethereal group ethereal 0.8.18

ethereal group ethereal 0.9.14

ethereal group ethereal 0.9.15

ethereal group ethereal 0.9.10

ethereal group ethereal 0.9.8

ethereal group ethereal 0.10.3

ethereal group ethereal 0.10.4

ethereal group ethereal 0.10.7

ethereal group ethereal 0.9.16

ethereal group ethereal 0.8.13

ethereal group ethereal 0.10.5

ethereal group ethereal 0.8.15

ethereal group ethereal 0.9.3

ethereal group ethereal 0.10

ethereal group ethereal 0.9.13

ethereal group ethereal 0.9.9

ethereal group ethereal 0.8.14

ethereal group ethereal 0.9.11

ethereal group ethereal 0.9.7

ethereal group ethereal 0.9.4

ethereal group ethereal 0.9.1

ethereal group ethereal 0.10.6

ethereal group ethereal 0.10.8

ethereal group ethereal 0.10.9

ethereal group ethereal 0.9

ethereal group ethereal 0.9.12

Vendor Advisories

Synopsis ethereal security update Type/Severity Security Advisory: Moderate Topic Updated Ethereal packages that fix various security vulnerabilities are nowavailableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description The ethereal ...

Exploits

/*****************************************************************/ /* */ /* Ethereal <= 01010 dissect_ipc_state() DoS */ /* Tested on 094 and 01010 */ /* */ /* Bug ...