Lucene search

K
cve[email protected]CVE-2011-3369
HistorySep 30, 2011 - 5:55 p.m.

CVE-2011-3369

2011-09-3017:55:00
web.nvd.nist.gov
22
etherape
add_conversation
denial of service
vulnerability
cve-2011-3369
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.6 Medium

AI Score

Confidence

Low

0.015 Low

EPSS

Percentile

86.8%

The add_conversation function in conversations.c in EtherApe before 0.9.12 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RPC packet, related to the get_rpc function in decode_proto.c.

Affected configurations

NVD
Node
juan_toledoetherapeRange0.9.11
OR
juan_toledoetherapeMatch0.0.1
OR
juan_toledoetherapeMatch0.0.2
OR
juan_toledoetherapeMatch0.0.3
OR
juan_toledoetherapeMatch0.0.4
OR
juan_toledoetherapeMatch0.0.5
OR
juan_toledoetherapeMatch0.0.6
OR
juan_toledoetherapeMatch0.0.7
OR
juan_toledoetherapeMatch0.0.8
OR
juan_toledoetherapeMatch0.1.0
OR
juan_toledoetherapeMatch0.1.1
OR
juan_toledoetherapeMatch0.1.2
OR
juan_toledoetherapeMatch0.1.3
OR
juan_toledoetherapeMatch0.1.4
OR
juan_toledoetherapeMatch0.1.5
OR
juan_toledoetherapeMatch0.1.6
OR
juan_toledoetherapeMatch0.1.7
OR
juan_toledoetherapeMatch0.1.8
OR
juan_toledoetherapeMatch0.1.9
OR
juan_toledoetherapeMatch0.2.0
OR
juan_toledoetherapeMatch0.2.1
OR
juan_toledoetherapeMatch0.2.2
OR
juan_toledoetherapeMatch0.2.3
OR
juan_toledoetherapeMatch0.2.4
OR
juan_toledoetherapeMatch0.2.5
OR
juan_toledoetherapeMatch0.2.6
OR
juan_toledoetherapeMatch0.2.7
OR
juan_toledoetherapeMatch0.2.8
OR
juan_toledoetherapeMatch0.2.9
OR
juan_toledoetherapeMatch0.2.10
OR
juan_toledoetherapeMatch0.2.11
OR
juan_toledoetherapeMatch0.3.0
OR
juan_toledoetherapeMatch0.3.1
OR
juan_toledoetherapeMatch0.3.2
OR
juan_toledoetherapeMatch0.3.3
OR
juan_toledoetherapeMatch0.3.4
OR
juan_toledoetherapeMatch0.3.5
OR
juan_toledoetherapeMatch0.3.6
OR
juan_toledoetherapeMatch0.3.7
OR
juan_toledoetherapeMatch0.3.8
OR
juan_toledoetherapeMatch0.3.9
OR
juan_toledoetherapeMatch0.4.0
OR
juan_toledoetherapeMatch0.4.1
OR
juan_toledoetherapeMatch0.4.2
OR
juan_toledoetherapeMatch0.4.3
OR
juan_toledoetherapeMatch0.4.4
OR
juan_toledoetherapeMatch0.4.5
OR
juan_toledoetherapeMatch0.4.6
OR
juan_toledoetherapeMatch0.4.7
OR
juan_toledoetherapeMatch0.5.0
OR
juan_toledoetherapeMatch0.5.1
OR
juan_toledoetherapeMatch0.5.2
OR
juan_toledoetherapeMatch0.5.3
OR
juan_toledoetherapeMatch0.5.4
OR
juan_toledoetherapeMatch0.5.5
OR
juan_toledoetherapeMatch0.5.6
OR
juan_toledoetherapeMatch0.5.7
OR
juan_toledoetherapeMatch0.5.8
OR
juan_toledoetherapeMatch0.5.9
OR
juan_toledoetherapeMatch0.6.0
OR
juan_toledoetherapeMatch0.6.1
OR
juan_toledoetherapeMatch0.6.2
OR
juan_toledoetherapeMatch0.6.3
OR
juan_toledoetherapeMatch0.6.4
OR
juan_toledoetherapeMatch0.6.5
OR
juan_toledoetherapeMatch0.6.6
OR
juan_toledoetherapeMatch0.6.7
OR
juan_toledoetherapeMatch0.6.8
OR
juan_toledoetherapeMatch0.6.9
OR
juan_toledoetherapeMatch0.7.0
OR
juan_toledoetherapeMatch0.7.1
OR
juan_toledoetherapeMatch0.7.2
OR
juan_toledoetherapeMatch0.7.3
OR
juan_toledoetherapeMatch0.7.4
OR
juan_toledoetherapeMatch0.7.5
OR
juan_toledoetherapeMatch0.7.6
OR
juan_toledoetherapeMatch0.7.7
OR
juan_toledoetherapeMatch0.7.8
OR
juan_toledoetherapeMatch0.8.0
OR
juan_toledoetherapeMatch0.8.1
OR
juan_toledoetherapeMatch0.8.2
OR
juan_toledoetherapeMatch0.9.0
OR
juan_toledoetherapeMatch0.9.1
OR
juan_toledoetherapeMatch0.9.2
OR
juan_toledoetherapeMatch0.9.3
OR
juan_toledoetherapeMatch0.9.4
OR
juan_toledoetherapeMatch0.9.5
OR
juan_toledoetherapeMatch0.9.6
OR
juan_toledoetherapeMatch0.9.7
OR
juan_toledoetherapeMatch0.9.8
OR
juan_toledoetherapeMatch0.9.9
OR
juan_toledoetherapeMatch0.9.10

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.6 Medium

AI Score

Confidence

Low

0.015 Low

EPSS

Percentile

86.8%