CVE-2004-1139

CVE information

Published

17 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash)..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:
  Yes
- -
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia
  Yes
- -
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*
  Yes
- -
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_pr
  Yes
- -
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*
  Yes
- -
cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
  Yes
- -

Get started for free to scan for vulnerabilities

Companies of all sizes use Mageni to scan their assets for vulnerabilities. Mageni is free for 7-days then $39 USD Monthly regardless of how many IPs, scans, deployments or users you have. Cancel at Anytime and 7-days Money-Back Guarantee. Developed and supported by certified CompTIA PenTest+ professionals. Mageni contributes 1% of your subscription to removing CO₂ from the atmosphere.

Get Started For Free
App screenshot