APP: Ethereal IGAP Protocol Dissector Account Overflow

This signature detects attempts to exploit a known vulnerability against Ethereal, a network analyzer application. Attackers can send a maliciously crafted IGAP Membership Query request with an overly long account name or message, to overflow the buffer and execute arbitrary code.

Extended Description

Ethereal 0.10.3 has been released to address multiple vulnerabilities. These issues include: - Thirteen stack-based buffer overruns in various protocol dissectors (NetFlow, IGAP, EIGRP, PGM, IrDA, BGP, ISUP, and TCAP). - A denial of service that is triggered by a zero length Presentation protocol selector. - Specially crafted RADIUS packets may cause a crash in Ethereal. - Corrupt color filter files may cause a crash in Ethereal. These issues may result in a denial of service or potentially be leveraged to execute arbitrary code in the instance of the buffer overruns.

Affected Products

Ethereal_group ethereal

Short Name
APP:ETHEREAL:IGAP-ACCT-OF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Account CVE-2004-0176 Dissector Ethereal IGAP Overflow Protocol bid:9952
Release Date
04/01/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
IP/2
False Positive
Unknown
Vendors

Sgi

Ethereal_group

Gentoo

CVSS Score

5.0

Found a potential security threat?