Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several remote vulnerabilities have been discovered in the Ethereal network
scanner, which may lead to the execution of arbitrary code. The Common
Vulnerabilities and Exposures project identifies the following problems:
It was discovered that the Q.2391 dissector is vulnerable to denial
of service caused by memory exhaustion.
It was discovered that the FC-FCS, RSVP and ISIS-LSP dissectors are
vulnerable to denial of service caused by memory exhaustion.
It was discovered that the IrDA and SMB dissectors are vulnerable to
denial of service caused by memory corruption.
It was discovered that the SLIMP3 and AgentX dissectors are vulnerable
to code injection caused by buffer overflows.
It was discovered that the BER dissector is vulnerable to denial of
service caused by an infinite loop.
It was discovered that the NCP and RTnet dissectors are vulnerable to
denial of service caused by a null pointer dereference.
It was discovered that the X11 dissector is vulnerable to denial of service
caused by a division through zero.
This update also fixes a 64 bit-specific regression in the ASN.1 decoder, which
was introduced in a previous DSA.
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
version 0.99.2-5.1 of wireshark, the network sniffer formerly known as
We recommend that you upgrade your ethereal packages.
Solution : http://www.debian.org/security/2006/dsa-1171
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Enigma Machine UNIVAC Altair 8800 ENIAC 1974 Mark-8 Steve Wozniak Apple Lisa IBM
|70's Solid State Music Manuals 2K/4K Eprom & 2P+2S I/O Board Static IMSAI Altair
|Vector Graphics PROM/RAM Board User's Manual & Assembly Instruction for Altair
|Vintage GODBOUT Electronics EROM Board Instructions for the ALTAIR MITS 8800
No Discussions have been posted on this vulnerability.