Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several remote vulnerabilities have been discovered in the Ethereal network
scanner, which may lead to the execution of arbitrary code. The Common
Vulnerabilities and Exposures project identifies the following problems:
It was discovered that the Q.2391 dissector is vulnerable to denial
of service caused by memory exhaustion.
It was discovered that the FC-FCS, RSVP and ISIS-LSP dissectors are
vulnerable to denial of service caused by memory exhaustion.
It was discovered that the IrDA and SMB dissectors are vulnerable to
denial of service caused by memory corruption.
It was discovered that the SLIMP3 and AgentX dissectors are vulnerable
to code injection caused by buffer overflows.
It was discovered that the BER dissector is vulnerable to denial of
service caused by an infinite loop.
It was discovered that the NCP and RTnet dissectors are vulnerable to
denial of service caused by a null pointer dereference.
It was discovered that the X11 dissector is vulnerable to denial of service
caused by a division through zero.
This update also fixes a 64 bit-specific regression in the ASN.1 decoder, which
was introduced in a previous DSA.
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
version 0.99.2-5.1 of wireshark, the network sniffer formerly known as
We recommend that you upgrade your ethereal packages.
Solution : http://www.debian.org/security/2006/dsa-1171
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Knoppix 7.2.0 Live Linux Bootable Startup CD (Runs form CD) +Free Retro Linux CD
|Latest KNOPPIX LINUX Operating system PC repair Bootable live system Windows USB
|KNOPPIX LINUX - NEW v7.7.1 Live DVD & 16GB 3.0 USB Flash Drive with Persistence
|Knoppix Linux Live USB 32 64 bit Debian GNU Apache MySQL w/setup guide
No Discussions have been posted on this vulnerability.