{"api_version":"1","generated_at":"2026-04-22T23:08:56+00:00","cve":"CVE-2005-0699","urls":{"html":"https://cve.report/CVE-2005-0699","api":"https://cve.report/api/cve/CVE-2005-0699.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-0699","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-0699"},"summary":{"title":"CVE-2005-0699","description":"Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-03-08 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.securityfocus.com/bid/12759","name":"http://www.securityfocus.com/bid/12759","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"Ethereal RADIUS Authentication Dissection Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10147","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10147","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=111083125521813&w=2","name":"http://marc.info/?l=bugtraq&m=111083125521813&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'Ethereal 0.10.9 and below remote root exploit' - MARC","mime":"text/x-c","httpstatus":"200","archivestatus":"200"},{"url":"http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04","name":"http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"404 Not Found","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-306.html","name":"http://www.redhat.com/support/errata/RHSA-2005-306.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:053","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:053","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html","name":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[FLSA-2006:152922] Updated ethereal packages fix security issues","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/392659","name":"http://www.securityfocus.com/archive/1/392659","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200503-16.xml","name":"http://security.gentoo.org/glsa/glsa-200503-16.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Gentoo Linux Documentation\n--\n  Ethereal: Multiple vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ethereal.com/appnotes/enpa-sa-00018.html","name":"http://www.ethereal.com/appnotes/enpa-sa-00018.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory","URL Repurposed"],"title":"Ethereal: enpa-sa-00018","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=111038641832400&w=2","name":"http://marc.info/?l=bugtraq&m=111038641832400&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'RE: Ethereal remote buffer overflow - addon' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-0699","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0699","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"altlinux","cpe5":"alt_linux","cpe6":"compact_2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"altlinux","cpe5":"alt_linux","cpe6":"junior_2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"conectiva","cpe5":"linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"conectiva","cpe5":"linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ethereal_group","cpe5":"ethereal","cpe6":"0.10.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ethereal_group","cpe5":"ethereal","cpe6":"0.10.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ethereal_group","cpe5":"ethereal","cpe6":"0.10.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ethereal_group","cpe5":"ethereal","cpe6":"0.10.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ethereal_group","cpe5":"ethereal","cpe6":"0.10.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ethereal_group","cpe5":"ethereal","cpe6":"0.10.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ethereal_group","cpe5":"ethereal","cpe6":"0.10.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"advanced_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"advanced_server_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"enterprise_server_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"workstation","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"2.1","cpe7":"*","cpe8":"workstation_ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"advanced_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"workstation_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"advanced_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"enterprise_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"workstation","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux_advanced_workstation","cpe6":"2.1","cpe7":"*","cpe8":"ia64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"699","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"linux_advanced_workstation","cpe6":"2.1","cpe7":"*","cpe8":"itanium_processor","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T21:21:06.488Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"GLSA-200503-16","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200503-16.xml"},{"name":"MDKSA-2005:053","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:053"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.ethereal.com/appnotes/enpa-sa-00018.html"},{"name":"oval:org.mitre.oval:def:10147","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10147"},{"name":"12759","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/12759"},{"name":"RHSA-2005:306","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-306.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04"},{"name":"20050314 Ethereal 0.10.9 and below remote root exploit","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=111083125521813&w=2"},{"name":"20050309 RE: Ethereal remote buffer overflow - addon","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=111038641832400&w=2"},{"name":"20050308 Ethereal remote buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/392659"},{"name":"FLSA-2006:152922","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-03-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"GLSA-200503-16","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200503-16.xml"},{"name":"MDKSA-2005:053","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:053"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.ethereal.com/appnotes/enpa-sa-00018.html"},{"name":"oval:org.mitre.oval:def:10147","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10147"},{"name":"12759","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/12759"},{"name":"RHSA-2005:306","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-306.html"},{"tags":["x_refsource_MISC"],"url":"http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04"},{"name":"20050314 Ethereal 0.10.9 and below remote root exploit","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=111083125521813&w=2"},{"name":"20050309 RE: Ethereal remote buffer overflow - addon","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=111038641832400&w=2"},{"name":"20050308 Ethereal remote buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/392659"},{"name":"FLSA-2006:152922","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-0699","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"GLSA-200503-16","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200503-16.xml"},{"name":"MDKSA-2005:053","refsource":"MANDRAKE","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:053"},{"name":"http://www.ethereal.com/appnotes/enpa-sa-00018.html","refsource":"CONFIRM","url":"http://www.ethereal.com/appnotes/enpa-sa-00018.html"},{"name":"oval:org.mitre.oval:def:10147","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10147"},{"name":"12759","refsource":"BID","url":"http://www.securityfocus.com/bid/12759"},{"name":"RHSA-2005:306","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2005-306.html"},{"name":"http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04","refsource":"MISC","url":"http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04"},{"name":"20050314 Ethereal 0.10.9 and below remote root exploit","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=111083125521813&w=2"},{"name":"20050309 RE: Ethereal remote buffer overflow - addon","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=111038641832400&w=2"},{"name":"20050308 Ethereal remote buffer overflow","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/392659"},{"name":"FLSA-2006:152922","refsource":"FEDORA","url":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-0699","datePublished":"2005-03-09T05:00:00.000Z","dateReserved":"2005-03-09T00:00:00.000Z","dateUpdated":"2024-08-07T21:21:06.488Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-03-08 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*","matchCriteriaId":"350ABD20-6BB8-4EDB-9DD1-6D1802D892A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*","matchCriteriaId":"F5A659C0-2CDA-44EF-9D5F-0A57B3F14E5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*","matchCriteriaId":"FB12CA01-E0EA-4E84-802F-CC52268D65FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*","matchCriteriaId":"9704EC6E-7219-41FC-BE00-CD91A246C61E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*","matchCriteriaId":"2B93B95E-F295-468C-A6A2-5AA6DE729E52"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*","matchCriteriaId":"AE94BFB1-67E2-4503-AEA8-2CD5DBD4F88B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*","matchCriteriaId":"8D45EF17-50C9-4FF9-A41C-C78A0C40AD20"},{"vulnerable":true,"criteria":"cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*","matchCriteriaId":"F4007B0D-9606-46BD-866A-7911BEA292BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"A35FC777-A34E-4C7B-9E93-8F17F3AD5180"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:altlinux:alt_linux:compact_2.3:*:*:*:*:*:*:*","matchCriteriaId":"8D6FD322-2883-407F-A694-7B0B49D81E43"},{"vulnerable":true,"criteria":"cpe:2.3:o:altlinux:alt_linux:junior_2.3:*:*:*:*:*:*:*","matchCriteriaId":"3753D1E6-7AB6-46FB-B652-856D137E43C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","matchCriteriaId":"2641EE56-6F9D-400B-B456-877F4DA79B10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","matchCriteriaId":"A4A9461E-C117-42EC-9F14-DF2A82BA7C5D"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"E0B458EA-495E-40FA-9379-C03757F7B1EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","matchCriteriaId":"409E324A-C040-494F-A026-9DCAE01C07F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","matchCriteriaId":"1728AB5D-55A9-46B0-A412-6F7263CAEB5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","matchCriteriaId":"6474B775-C893-491F-A074-802AFB1FEDD8"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","matchCriteriaId":"78B46FFA-5B09-473E-AD33-3DB18BD0DAFE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"EC79FF22-2664-4C40-B0B3-6D23B5F45162"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","matchCriteriaId":"0EFE2E73-9536-41A9-B83B-0A06B54857F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","matchCriteriaId":"F9440B25-D206-4914-9557-B5F030890DEC"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"E9933557-3BCA-4D92-AD4F-27758A0D3347"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","matchCriteriaId":"10A60552-15A5-4E95-B3CE-99A4B26260C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","matchCriteriaId":"7D74A418-50F0-42C0-ABBC-BBBE718FF025"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","matchCriteriaId":"84A50ED3-FD0D-4038-B3E7-CC65D166C968"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*","matchCriteriaId":"777F9EC0-2919-45CA-BFF8-78A02537C513"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"699","Ordinal":"1","Title":"CVE-2005-0699","CVE":"CVE-2005-0699","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"699","Ordinal":"1","NoteData":"Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.","Type":"Description","Title":"CVE-2005-0699"},{"CveYear":"2005","CveId":"699","Ordinal":"2","NoteData":"2005-03-09","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"699","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}