Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-03] Ethereal: Numerous vulnerabilities


Vulnerability Assessment Details

[GLSA-200505-03] Ethereal: Numerous vulnerabilities

Vulnerability Assessment Summary
Ethereal: Numerous vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200505-03
(Ethereal: Numerous vulnerabilities)


There are numerous vulnerabilities in versions of Ethereal prior
to 0.10.11, including:
The ANSI A and DHCP dissectors are
vulnerable to format string vulnerabilities.
The DISTCC,
FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit, PKIX
Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation
dissectors are vulnerable to buffer overflows.
The KINK, WSP,
SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON dissectors
are vulnerable to pointer handling errors.
The LMP, KINK,
MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP dissectors are
vulnerable to looping problems.
The Telnet and DHCP dissectors
could abort.
The TZSP, Bittorrent, SMB, MGCP and ISUP
dissectors could cause a segmentation fault.
The WSP, 802.3
Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS, SMB PIPE,
MRDISC and TCAP dissectors could throw assertions.
The DICOM,
NDPS and ICEP dissectors are vulnerable to memory handling errors.
The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP
dissectors could terminate abnormallly.

Impact

A possible hacker might be able to use these vulnerabilities to crash
Ethereal and execute arbitrary code with the permissions of the user
running Ethereal, which could be the root user.

Workaround

There is no known workaround at this time.

References:
http://www.ethereal.com/appnotes/enpa-sa-00019.html
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1456
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1457
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1458
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1459
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1460
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1461
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1462
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1463
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1464
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1465
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1466
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1467
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1468
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1469
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1470


Solution:
All Ethereal users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors


LSI 9305-16i SATA SAS 12Gbs RAID Controller PCIe 3.0 x8 IT-Mode 4* 8643 SATA picture

LSI 9305-16i SATA SAS 12Gbs RAID Controller PCIe 3.0 x8 IT-Mode 4* 8643 SATA

$229.99



HPE 869102-001 Smart Array E208i-a SR Gen10 Storage Controller RAID SP: 871039 picture

HPE 869102-001 Smart Array E208i-a SR Gen10 Storage Controller RAID SP: 871039

$116.99



Lot of 4 - Genuine Dell (62P9H) PERC H710 512MB Mini Blade 6Gbps SAS Raid picture

Lot of 4 - Genuine Dell (62P9H) PERC H710 512MB Mini Blade 6Gbps SAS Raid

$44.99



Lot of 2 -Dell P2R3R PERC H330 Mini Mono 12Gbps SAS Non-raid Controller 0P2R3R picture

Lot of 2 -Dell P2R3R PERC H330 Mini Mono 12Gbps SAS Non-raid Controller 0P2R3R

$35.99



Inspur LSI 9300-8i Raid Card 12Gbps HBA HDD Controller High Profile IT MODE picture

Inspur LSI 9300-8i Raid Card 12Gbps HBA HDD Controller High Profile IT MODE

$15.98



LSI MegaRAID 9361-8i 12Gb PCIe 8-Port SAS/SATA RAID 1Gb w/BBU/CacheVault/License picture

LSI MegaRAID 9361-8i 12Gb PCIe 8-Port SAS/SATA RAID 1Gb w/BBU/CacheVault/License

$39.95



LSI MegaRAID 9361-8i 12Gbps PCIe 3 x8 SATA SAS 3 8 Port RAID + BBU & CacheVault picture

LSI MegaRAID 9361-8i 12Gbps PCIe 3 x8 SATA SAS 3 8 Port RAID + BBU & CacheVault

$39.00



ORICO Multi Bay RAID Hard Drive Enclosure USB 3.0/ Type-C For 2.5/3.5'' HDD SSDs picture

ORICO Multi Bay RAID Hard Drive Enclosure USB 3.0/ Type-C For 2.5/3.5'' HDD SSDs

$82.49



ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID picture

ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID

$58.99



NEW LSI MEGARAID SAS 9361-8i 12GB/s SAS + SATA RAID CONTROLLER CARD PCIe x8 3.0 picture

NEW LSI MEGARAID SAS 9361-8i 12GB/s SAS + SATA RAID CONTROLLER CARD PCIe x8 3.0

$99.00



Discussions

No Discussions have been posted on this vulnerability.