Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2004-0633
The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.373
EPSS Ranking
96.9%
CVSS Severity
CVSS v2 Score
5.0
References
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
http://secunia.com/advisories/12024
http://securitytracker.com/id?1010655
http://www.ethereal.com/appnotes/enpa-sa-00015.html
http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml
http://www.kb.cert.org/vuls/id/829422
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067
http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html
http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html
http://www.redhat.com/support/errata/RHSA-2004-378.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/16630
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9931
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
http://secunia.com/advisories/12024
http://securitytracker.com/id?1010655
http://www.ethereal.com/appnotes/enpa-sa-00015.html
http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml
http://www.kb.cert.org/vuls/id/829422
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067
http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html
http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html
http://www.redhat.com/support/errata/RHSA-2004-378.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/16630
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9931
Products affected by CVE-2004-0633
Ethereal Group
»
Ethereal
»
Version:
0.10.3
cpe:2.3:a:ethereal_group:ethereal:0.10.3
Ethereal Group
»
Ethereal
»
Version:
0.10.4
cpe:2.3:a:ethereal_group:ethereal:0.10.4
Gentoo
»
Linux
»
Version:
N/A
cpe:2.3:o:gentoo:linux:-
Gentoo
»
Linux
»
Version:
1.2
cpe:2.3:o:gentoo:linux:1.2
Gentoo
»
Linux
»
Version:
1.4
cpe:2.3:o:gentoo:linux:1.4
Gentoo
»
Linux
»
Version:
2.1.30
cpe:2.3:o:gentoo:linux:2.1.30
Gentoo
»
Linux
»
Version:
2.2.28
cpe:2.3:o:gentoo:linux:2.2.28
Gentoo
»
Linux
»
Version:
2.3.30
cpe:2.3:o:gentoo:linux:2.3.30
Mandrakesoft
»
Mandrake Linux
»
Version:
10.0
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0
Mandrakesoft
»
Mandrake Linux
»
Version:
9.2
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2
Redhat
»
Enterprise Linux
»
Version:
2.1
cpe:2.3:o:redhat:enterprise_linux:2.1
Redhat
»
Enterprise Linux
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux:3.0
Redhat
»
Linux Advanced Workstation
»
Version:
2.1
cpe:2.3:o:redhat:linux_advanced_workstation:2.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved