Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several remote vulnerabilities have been discovered in the Ethereal network
scanner, which may lead to the execution of arbitrary code. The Common
Vulnerabilities and Exposures project identifies the following problems:
It was discovered that the Q.2391 dissector is vulnerable to denial
of service caused by memory exhaustion.
It was discovered that the FC-FCS, RSVP and ISIS-LSP dissectors are
vulnerable to denial of service caused by memory exhaustion.
It was discovered that the IrDA and SMB dissectors are vulnerable to
denial of service caused by memory corruption.
It was discovered that the SLIMP3 and AgentX dissectors are vulnerable
to code injection caused by buffer overflows.
It was discovered that the BER dissector is vulnerable to denial of
service caused by an infinite loop.
It was discovered that the NCP and RTnet dissectors are vulnerable to
denial of service caused by a null pointer dereference.
It was discovered that the X11 dissector is vulnerable to denial of service
caused by a division through zero.
This update also fixes a 64 bit-specific regression in the ASN.1 decoder, which
was introduced in a previous DSA.
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
version 0.99.2-5.1 of wireshark, the network sniffer formerly known as
We recommend that you upgrade your ethereal packages.
Solution : http://www.debian.org/security/2006/dsa-1171
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|IBM X3550 M2 Server-2x Xeon X5570 2.93Ghz, 32GB RAM, 6 x 146GB SAS 10K, Windows
|2X IBM xSeries x3650 x3400 x3500 E SERVER HEATSINK HEAT SINK 40K7438 42C9412
|IBM Lenovo TD340 Tower Server Intel® Xeon® E5-2403 2x900GB 10k SAS 32gb DDR3
| GENUINE IBM X3650 X3655 E SERVER FANS 39M6803 J92516D 46C4014 FAN
No Discussions have been posted on this vulnerability.