Description
Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.
Product(s):
- Ethereal Group Ethereal 0.10.3
- Ethereal Group Ethereal 0.10.4
- Ethereal Group Ethereal 0.10.5
- Ethereal Group Ethereal 0.10.6
- Ethereal Group Ethereal 0.10.7
- Ethereal Group Ethereal 0.10.8
- Ethereal Group Ethereal 0.10.9
- ALT Linux Compact 2.3
- ALT Linux Junior 2.3
- Conectiva Linux 10.0
- Conectiva Linux 9.0
- Red Hat Enterprise Linux 2.1 Advanced Server
- Red Hat Enterprise Linux 2.1 Advanced Server IA64
- Red Hat Enterprise Linux 2.1 Enterprise Server
- Red Hat Enterprise Linux 2.1 Enterprise Server IA64
- Red Hat Enterprise Linux 2.1 Workstation
- Red Hat Enterprise Linux 2.1 Workstation IA64
- Red Hat Enterprise Linux 3.0 Advanced Server Edition
- Red Hat Enterprise Linux 3.0 Enterprise Server Edition
- Red Hat Enterprise Linux 3.0 Workstation Server Edition
- Red Hat Enterprise Linux 4.0 Advanced Server
- Red Hat Enterprise Linux 4.0 Enterprise Server
- Red Hat Enterprise Linux 4.0 Workstation
- Red Hat Desktop 3.0
- Red Hat Desktop 4.0
- Red Hat Linux Advanced Workstation 2.1 on IA64
- Red Hat Linux Advanced Workstation 2.1 on Itanium Processor
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0699, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0699 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.