Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Security)  >   Wireshark Vendors:
Ethereal Network Sniffer Buffer Overflow in Processing the ISIS Protocol May Let Remote Users Crash the Sniffer or Execute Arbitrary Code
SecurityTracker Alert ID:  1005092
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Aug 21 2002
Impact:   Denial of service via network, Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.9.5 and prior versions
Description:   A buffer overflow vulnerability was reported in the Ethereal network sniffer in the ISIS protocol dissector. A remote user may be able to cause the sniffer to crash or possibly execute arbitrary code.

It is reported that a remote user can inject a specially crafted and malformed packet (either over the network or via a packet trace file) to trigger the buffer overflow.

Impact:   A remote user can cause Ethereal to crash. A remote user may be able to cause Ethereal to execute arbitrary code.
Solution:   The vendor has released a fixed version (0.9.6), available at:

If you are running a version prior to 0.9.6, you can disable the ISIS protocol dissector by selecting Edit->Protocols... and deselecting "isis" from the list.

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  Ethereal bug

This is a multi-part message in MIME format.
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=us-ascii;
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;


   Sniffing the glue that holds the Internet together 
   Search: __________  options
     [   Application Notes    |   Summary    |   Details    |   Home   ]
   Name: Potential issue with Ethereal 0.9.5
   Docid: enpa-sa-00006
   Date: August 20, 2002
   Severity: High
   The ISIS protocol dissector in Ethereal 0.9.5 and earlier versions is
   susceptible to a buffer overflow. In order to determine which version of
   Ethereal you have installed, do one of the following:
     * Load Ethereal and go to the Help->About Ethereal... menu item.
     * From the command line run
ethereal -v
tethereal -v
       (the "v" is lowercase").
   Either action will display the the application version along with the
   libraries that Ethereal and Tethereal are linked with. If version
   "0.9.5" or prior is displayed, the application is susceptible.
   It may be possible to make Ethereal crash or hang by injecting a
   purposefully malformed packet onto the wire, or by convincing someone to
   read a malformed packet trace file. It may be possible to make Ethereal
   run arbitrary code by exploiting the buffer and pointer problems.
   Upgrade to 0.9.6.
   If you are running a version prior to 0.9.6, you can disable the ISIS
   protocol dissector by selecting Edit->Protocols... and deselecting
   "isis" from the list.
   Support can be found on the ethereal-users[AT] mailing list.
   For corrections/additions/suggestions for this page, please send email
   to: ethereal-web[AT]
   Last modified: Tue, August 20 2002.



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, LLC