CVE
- Id
- 14855
- CVE No.
- CVE-2005-3651
- Status
- Candidate
- Description
- Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.
- Phase
- Assigned (20051118)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
| Id | CVE Id | CVE No. | Reference | Actions |
|---|---|---|---|---|
| 114641 | 14855 | CVE-2005-3651 | IDEFENSE:20051209 Ethereal OSPF Protocol Dissector Buffer Overflow Vulnerability | View |
| 114642 | 14855 | CVE-2005-3651 | URL:http://www.idefense.com/application/poi/display?id=349&type=vulnerabilities | View |
| 114643 | 14855 | CVE-2005-3651 | MISC:http://anonsvn.ethereal.com/viewcvs/viewcvs.py/trunk/epan/dissectors/packet-ospf.c | View |
| 114644 | 14855 | CVE-2005-3651 | CONFIRM:http://www.ethereal.com/appnotes/enpa-sa-00022.html | View |
| 114645 | 14855 | CVE-2005-3651 | DEBIAN:DSA-920 | View |
| 114646 | 14855 | CVE-2005-3651 | URL:http://www.debian.org/security/2005/dsa-920 | View |
| 114647 | 14855 | CVE-2005-3651 | GENTOO:GLSA-200512-06 | View |
| 114648 | 14855 | CVE-2005-3651 | URL:http://www.gentoo.org/security/en/glsa/glsa-200512-06.xml | View |
| 114649 | 14855 | CVE-2005-3651 | MANDRIVA:MDKSA-2005:227 | View |
| 114650 | 14855 | CVE-2005-3651 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2005:227 | View |
| 114651 | 14855 | CVE-2005-3651 | MANDRIVA:MDKSA-2006:002 | View |
| 114652 | 14855 | CVE-2005-3651 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:002 | View |
| 114653 | 14855 | CVE-2005-3651 | REDHAT:RHSA-2006:0156 | View |
| 114654 | 14855 | CVE-2005-3651 | URL:http://www.redhat.com/support/errata/RHSA-2006-0156.html | View |
| 114655 | 14855 | CVE-2005-3651 | SGI:20060201-01-U | View |
| 114656 | 14855 | CVE-2005-3651 | URL:ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U | View |
| 114657 | 14855 | CVE-2005-3651 | SUSE:SUSE-SR:2006:004 | View |
| 114658 | 14855 | CVE-2005-3651 | URL:http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html | View |
| 114659 | 14855 | CVE-2005-3651 | BID:15794 | View |
| 114660 | 14855 | CVE-2005-3651 | URL:http://www.securityfocus.com/bid/15794 | View |
| 114661 | 14855 | CVE-2005-3651 | OVAL:oval:org.mitre.oval:def:11286 | View |
| 114662 | 14855 | CVE-2005-3651 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11286 | View |
| 114663 | 14855 | CVE-2005-3651 | VUPEN:ADV-2005-2830 | View |
| 114664 | 14855 | CVE-2005-3651 | URL:http://www.vupen.com/english/advisories/2005/2830 | View |
| 114665 | 14855 | CVE-2005-3651 | SECTRACK:1015337 | View |
| 114666 | 14855 | CVE-2005-3651 | URL:http://securitytracker.com/id?1015337 | View |
| 114667 | 14855 | CVE-2005-3651 | SECUNIA:17973 | View |
| 114668 | 14855 | CVE-2005-3651 | URL:http://secunia.com/advisories/17973 | View |
| 114669 | 14855 | CVE-2005-3651 | SECUNIA:18012 | View |
| 114670 | 14855 | CVE-2005-3651 | URL:http://secunia.com/advisories/18012 | View |
| 114671 | 14855 | CVE-2005-3651 | SECUNIA:18062 | View |
| 114672 | 14855 | CVE-2005-3651 | URL:http://secunia.com/advisories/18062 | View |
| 114673 | 14855 | CVE-2005-3651 | SECUNIA:18426 | View |
| 114674 | 14855 | CVE-2005-3651 | URL:http://secunia.com/advisories/18426 | View |
| 114675 | 14855 | CVE-2005-3651 | SECUNIA:19230 | View |
| 114676 | 14855 | CVE-2005-3651 | URL:http://secunia.com/advisories/19230 | View |
| 114677 | 14855 | CVE-2005-3651 | SECUNIA:18331 | View |
| 114678 | 14855 | CVE-2005-3651 | URL:http://secunia.com/advisories/18331 | View |
| 114679 | 14855 | CVE-2005-3651 | SECUNIA:19012 | View |
| 114680 | 14855 | CVE-2005-3651 | URL:http://secunia.com/advisories/19012 | View |
| 114681 | 14855 | CVE-2005-3651 | SECUNIA:18911 | View |
| 114682 | 14855 | CVE-2005-3651 | URL:http://secunia.com/advisories/18911 | View |
| 114683 | 14855 | CVE-2005-3651 | SREASON:247 | View |