APP: Ethereal 3G-A11

This signature detects attempts to exploit a known vulnerability in Ethereal, a protocol analyzer. Ethereal versions 0.10.3 to 0.10.9 are vulnerable. Attackers can send an overly large string to overflow the buffer in the 3G-A11 protocol function, which dissects RADIUS authentication communications. Attackers can then execute arbitrary code with the permissions of the Ethereal user, typically root.

Extended Description

A remote buffer-overflow vulnerability reportedly affects Ethereal because it fails to securely copy network-derived data into sensitive process buffers. The specific issue resides in the 3GPP2 A11 dissector. An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.

Affected Products

Avaya s8710,Red_hat enterprise_linux_es

Short Name
APP:ETHEREAL:3G-A11-B0F
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
3G-A11 CVE-2005-0699 Ethereal bid:12759
Release Date
03/28/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
UDP/699
False Positive
Unknown
Vendors

Red_hat

Conectiva

Ethereal_group

Avaya

Alt_linux

CVSS Score

7.5

Found a potential security threat?