Lucene search

K
cve[email protected]CVE-2004-1142
HistoryDec 31, 2004 - 5:00 a.m.

CVE-2004-1142

2004-12-3105:00:00
web.nvd.nist.gov
22
ethereal
cve-2004-1142
denial of service
smb
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.2 Medium

AI Score

Confidence

Low

0.025 Low

EPSS

Percentile

90.1%

Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.

Affected configurations

NVD
Node
ethereal_groupetherealMatch0.9
OR
ethereal_groupetherealMatch0.9.1
OR
ethereal_groupetherealMatch0.9.2
OR
ethereal_groupetherealMatch0.9.3
OR
ethereal_groupetherealMatch0.9.4
OR
ethereal_groupetherealMatch0.9.5
OR
ethereal_groupetherealMatch0.9.6
OR
ethereal_groupetherealMatch0.9.7
OR
ethereal_groupetherealMatch0.9.8
OR
ethereal_groupetherealMatch0.9.9
OR
ethereal_groupetherealMatch0.9.10
OR
ethereal_groupetherealMatch0.9.11
OR
ethereal_groupetherealMatch0.9.12
OR
ethereal_groupetherealMatch0.9.13
OR
ethereal_groupetherealMatch0.9.14
OR
ethereal_groupetherealMatch0.9.15
OR
ethereal_groupetherealMatch0.9.16
OR
ethereal_groupetherealMatch0.10
OR
ethereal_groupetherealMatch0.10.1
OR
ethereal_groupetherealMatch0.10.2
OR
ethereal_groupetherealMatch0.10.3
OR
ethereal_groupetherealMatch0.10.4
OR
ethereal_groupetherealMatch0.10.5
OR
ethereal_groupetherealMatch0.10.6
OR
ethereal_groupetherealMatch0.10.7
OR
sgipropackMatch3.0
OR
conectivalinuxMatch9.0
OR
conectivalinuxMatch10.0
Node
altlinuxalt_linuxMatch2.3compact
OR
altlinuxalt_linuxMatch2.3junior
OR
debiandebian_linuxMatch3.0alpha
OR
debiandebian_linuxMatch3.0arm
OR
debiandebian_linuxMatch3.0hppa
OR
debiandebian_linuxMatch3.0ia-32
OR
debiandebian_linuxMatch3.0ia-64
OR
debiandebian_linuxMatch3.0m68k
OR
debiandebian_linuxMatch3.0mips
OR
debiandebian_linuxMatch3.0mipsel
OR
debiandebian_linuxMatch3.0ppc
OR
debiandebian_linuxMatch3.0s-390
OR
debiandebian_linuxMatch3.0sparc
OR
redhatenterprise_linuxMatch2.1advanced_server
OR
redhatenterprise_linuxMatch2.1advanced_server_ia64
OR
redhatenterprise_linuxMatch2.1enterprise_server
OR
redhatenterprise_linuxMatch2.1enterprise_server_ia64
OR
redhatenterprise_linuxMatch2.1workstation
OR
redhatenterprise_linuxMatch2.1workstation_ia64
OR
redhatenterprise_linuxMatch3.0advanced_server
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation_server
OR
redhatenterprise_linux_desktopMatch3.0
OR
redhatlinux_advanced_workstationMatch2.1ia64
OR
redhatlinux_advanced_workstationMatch2.1itanium_processor
OR
susesuse_linuxMatch8.0
OR
susesuse_linuxMatch8.0i386
OR
susesuse_linuxMatch8.1
OR
susesuse_linuxMatch8.2
OR
susesuse_linuxMatch9.0
OR
susesuse_linuxMatch9.0x86_64
OR
susesuse_linuxMatch9.1
OR
susesuse_linuxMatch9.2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.2 Medium

AI Score

Confidence

Low

0.025 Low

EPSS

Percentile

90.1%