ID SECURITYVULNS:VULN:5581
Type securityvulns
Reporter SECUNIA
Modified 2005-12-28T00:00:00
Description
Infinite loop on parsing GTP protocol.
{"id": "SECURITYVULNS:VULN:5581", "bulletinFamily": "software", "title": "Ethereal GTP protocol DoS", "description": "Infinite loop on parsing GTP protocol.", "published": "2005-12-28T00:00:00", "modified": "2005-12-28T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:5581", "reporter": "SECUNIA", "references": ["https://vulners.com/securityvulns/securityvulns:doc:10836"], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:09:20", "edition": 1, "viewCount": 3, "enchantments": {"score": {"value": 5.9, "vector": "NONE", "modified": "2018-08-31T11:09:20", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2019-5581", "CVE-2013-5581"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562311220171227", "OPENVAS:1361412562311220171228"]}, {"type": "nessus", "idList": ["ORACLELINUX_ELSA-2017-2000.NASL", "ALA_ALAS-2017-879.NASL", "EULEROS_SA-2017-1228.NASL", "CENTOS_RHSA-2017-2000.NASL", "SL_20170801_TIGERVNC_AND_FLTK_ON_SL7_X.NASL", "EULEROS_SA-2017-1227.NASL", "NEWSTART_CGSL_NS-SA-2019-0106_TIGERVNC.NASL"]}, {"type": "msupdate", "idList": ["MS:9ECD6FD4-32CF-4FF1-BCAA-0DD246F6B232"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:146216"]}, {"type": "zdt", "idList": ["1337DAY-ID-29696"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:B45C2D85CF4F275FCCB1D584C4022AB3"]}, {"type": "exploitdb", "idList": ["EDB-ID:43959"]}, {"type": "ossfuzz", "idList": ["OSSFUZZ-5581"]}, {"type": "amazon", "idList": ["ALAS-2017-879"]}, {"type": "openbugbounty", "idList": ["OBB:284077"]}, {"type": "centos", "idList": ["CESA-2017:2000"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:10836"]}], "modified": "2018-08-31T11:09:20", "rev": 2}, "vulnersScore": 5.9}, "affectedSoftware": [{"name": "Ethereal", "operator": "eq", "version": "0.10"}]}
{"rst": [{"lastseen": "2021-03-06T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **47[.]74.224.246** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2020-01-02T03:00:00, Last seen: 2021-03-06T03:00:00.\n IOC tags: **malware**.\nASN 45102: (First IP 47.74.89.170, Last IP 47.75.255.255).\nASN Name \"CNNICALIBABAUSNETAP\" and Organisation \"Alibaba US Technology Co Ltd\".\nASN hosts 8335286 domains.\nGEO IP information: City \"Singapore\", Country \"Singapore\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-01-02T00:00:00", "id": "RST:E466E6CD-5581-3467-B507-C338B353F382", "href": "", "published": "2021-03-07T00:00:00", "title": "RST Threat feed. IOC: 47.74.224.246", "type": "rst", "cvss": {}}, {"lastseen": "2021-03-06T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **5[.]9.244.157** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-03-06T03:00:00.\n IOC tags: **generic**.\nASN 24940: (First IP 5.9.0.0, Last IP 5.9.255.255).\nASN Name \"HETZNERAS\" and Organisation \"\".\nThis IP is a part of \"**hetzner**\" address pools.\nASN hosts 5266141 domains.\nGEO IP information: City \"\", Country \"Germany\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:1F1BB730-5581-380D-8574-CCCF6519134C", "href": "", "published": "2021-03-07T00:00:00", "title": "RST Threat feed. IOC: 5.9.244.157", "type": "rst", "cvss": {}}, {"lastseen": "2021-03-06T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **rdnzd[.]cn** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-03-06T03:00:00.\n IOC tags: **spam**.\nWhois:\n Created: 2020-05-20 13:34:48, \n Registrar: , \n Registrant: unknown.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:8F0BE9D5-5581-3E0E-9E99-32F05B51226E", "href": "", "published": "2021-03-07T00:00:00", "title": "RST Threat feed. IOC: rdnzd.cn", "type": "rst", "cvss": {}}, {"lastseen": "2021-03-06T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **177[.]10.196.26** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **12**.\n First seen: 2020-12-21T03:00:00, Last seen: 2021-03-06T03:00:00.\n IOC tags: **generic**.\nASN 262854: (First IP 177.10.192.0, Last IP 177.10.199.255).\nASN Name \"AFINET\" and Organisation \"SOLUCOES EM TECNOLOGIA DA INFORMACAO LTDA\".\nASN hosts 33 domains.\nGEO IP information: City \"Duque de Caxias\", Country \"Brazil\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-21T00:00:00", "id": "RST:50E17933-5581-33A6-A700-B2CC50430EDB", "href": "", "published": "2021-03-07T00:00:00", "title": "RST Threat feed. IOC: 177.10.196.26", "type": "rst", "cvss": {}}, {"lastseen": "2021-03-06T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **213[.]6.116.222** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **2**.\n First seen: 2020-02-01T03:00:00, Last seen: 2021-03-06T03:00:00.\n IOC tags: **generic**.\nASN 12975: (First IP 213.6.61.0, Last IP 213.6.131.255).\nASN Name \"PALTELAS\" and Organisation \"PALTEL Autonomous System\".\nASN hosts 557 domains.\nGEO IP information: City \"Bethlehem\", Country \"Palestine\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-02-01T00:00:00", "id": "RST:D9FDD701-5581-34A2-BB46-12CE571481D4", "href": "", "published": "2021-03-07T00:00:00", "title": "RST Threat feed. IOC: 213.6.116.222", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 host4.binance.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **48**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nDomain has DNS A records: 54[.]250.4.108,54.95.212.255\nWhois:\n Created: 2017-04-01 16:48:33, \n Registrar: MarkMonitor Inc, \n Registrant: Domain Administrator.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:462C256A-5581-3DD1-8C34-D6CC980D34D9", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 host4.binance.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-14T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **dhl-proxys[.]com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-14T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:6B5527B1-5581-323C-A79C-970C6091236E", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: dhl-proxys.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-14T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **disk-20cw0[.]stream** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-14T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:8B55FD79-5581-341B-91BC-46E3BF28D7B3", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: disk-20cw0.stream", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-14T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **bmxyvebkmyy[.]com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-14T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:B8B0D2AB-5581-3D88-AC31-2A05D4245E68", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: bmxyvebkmyy.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-15T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 www.wcjzgr.loan** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-02-15T03:00:00, Last seen: 2021-02-15T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-15T00:00:00", "id": "RST:B4540B88-5581-3A5E-96AF-EB3AAF325293", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 www.wcjzgr.loan", "type": "rst", "cvss": {}}]}