CVE-2006-1936

N/A Unknown
Published: April 25, 2006 Modified: April 16, 2026
View on NVD

Description

Buffer overflow in Ethereal 0.8.5 up to 0.10.14 allows remote attackers to execute arbitrary code via the telnet dissector.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/19769
Source: secalert@redhat.com
http://secunia.com/advisories/19805
Source: secalert@redhat.com
http://secunia.com/advisories/19828
Source: secalert@redhat.com
http://secunia.com/advisories/19839
Source: secalert@redhat.com
http://secunia.com/advisories/19958
Source: secalert@redhat.com
http://secunia.com/advisories/19962
Source: secalert@redhat.com
http://secunia.com/advisories/20117
Source: secalert@redhat.com
http://secunia.com/advisories/20210
Source: secalert@redhat.com
http://secunia.com/advisories/20944
Source: secalert@redhat.com
http://securitytracker.com/id?1015985
Source: secalert@redhat.com
http://www.ethereal.com/appnotes/enpa-sa-00023.html
Source: secalert@redhat.com
Patch URL Repurposed
http://www.securityfocus.com/bid/17682
Source: secalert@redhat.com
http://secunia.com/advisories/19769
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19805
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19828
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19839
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19958
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19962
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20117
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20210
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20944
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015985
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-128.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1049
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ethereal.com/appnotes/enpa-sa-00023.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch URL Repurposed
http://www.gentoo.org/security/en/glsa/glsa-200604-17.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:077
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0420.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17682
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1501
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/26029
Source: af854a3a-2127-422b-91ae-364da2661108

48 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.7%
82th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

ethereal_group