{"vuid":"VU#433596","idnumber":"433596","name":"Ethereal integer underflow when parsing malformed PGM packets with NAK lists","keywords":["Ethereal","integer underflow","Pragmatic General Multicast","PGM protocol dissector","PGM packet","NAK","negative acknowledgement","NakList"],"overview":"Ethereal fails to properly parse Pragmatic General Multicast (PGM) packets containing a crafted negative acknowledgement (NAK) list.","clean_desc":"Ethereal is a network traffic analysis package. It includes the ability to decode packets containing PGM data. There is a vulnerability in the way the PGM protocol dissector parses PGM data containing a crafted NAK list. According to the e-matters Security Advisory: \"When parsing an PGM packet with a carefully crafted NakList a possible integer underflow can result in a very small stack-overflow. Due to the stacklayout code execution exploitation seems very unlikely.\"","impact":"A remote, unauthenticated attacker could cause Ethereal to crash or possibly execute arbitrary code on the vulnerable system.","resolution":"Upgrade\nUpgrade to version 0.10.3 or later. Note: Ethereal is considered BETA software at this time.","workarounds":"Disable Dissector If you are unable to upgrade to version 0.10.3 or later, you can disable the PGM protocol dissector by performing the following actions in Ethereal: (for Ethereal versions 0.8.x and 0.9.x) 1) Select Edit->Protocols\n2) Deselect the PGM protocol dissector from the list (for Ethereal versions 0.10.x) 1) Select Analyze->Enabled Protocols\n2) Disable the PGM protocol dissector from the list by unchecking its \"Status\" checkbox","sysaffected":"","thanks":"Ethereal credits Stefan Esser for reporting this vulnerability.","author":"This document was written by Damon Morda.","public":["http://security.e-matters.de/advisories/032004.html","http://www.ethereal.com/appnotes/enpa-sa-00013.html","http://secunia.com/advisories/11185/","http://www.ietf.org/rfc/rfc3208.txt"],"cveids":["CVE-2004-0176"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-03-24T14:18:29Z","publicdate":"2004-03-22T00:00:00Z","datefirstpublished":"2004-03-24T18:49:25Z","dateupdated":"2004-03-25T15:34:08Z","revision":22,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"7","cam_impact":"7","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.0425","cam_scorecurrentwidelyknown":"4.96125","cam_scorecurrentwidelyknownexploited":"8.63625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.0425,"vulnote":null}