Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-03] Ethereal: Numerous vulnerabilities


Vulnerability Assessment Details

[GLSA-200505-03] Ethereal: Numerous vulnerabilities

Vulnerability Assessment Summary
Ethereal: Numerous vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200505-03
(Ethereal: Numerous vulnerabilities)


There are numerous vulnerabilities in versions of Ethereal prior
to 0.10.11, including:
The ANSI A and DHCP dissectors are
vulnerable to format string vulnerabilities.
The DISTCC,
FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit, PKIX
Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation
dissectors are vulnerable to buffer overflows.
The KINK, WSP,
SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON dissectors
are vulnerable to pointer handling errors.
The LMP, KINK,
MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP dissectors are
vulnerable to looping problems.
The Telnet and DHCP dissectors
could abort.
The TZSP, Bittorrent, SMB, MGCP and ISUP
dissectors could cause a segmentation fault.
The WSP, 802.3
Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS, SMB PIPE,
MRDISC and TCAP dissectors could throw assertions.
The DICOM,
NDPS and ICEP dissectors are vulnerable to memory handling errors.
The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP
dissectors could terminate abnormallly.

Impact

A possible hacker might be able to use these vulnerabilities to crash
Ethereal and execute arbitrary code with the permissions of the user
running Ethereal, which could be the root user.

Workaround

There is no known workaround at this time.

References:
http://www.ethereal.com/appnotes/enpa-sa-00019.html
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1456
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1457
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1458
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1459
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1460
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1461
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1462
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1463
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1464
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1465
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1466
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1467
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1468
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1469
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1470


Solution:
All Ethereal users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

G.SKILL Ripjaws 8GB 240-Pin DDR3 1333 (PC3 10666) Desktop Memory RAM
$39.99
G.SKILL Ripjaws 8GB 240-Pin DDR3 1333 (PC3 10666) Desktop Memory RAM picture16GB DELL MEMORY SNPJDF1MC/16G A6996807 20D6F
$110.0
16GB DELL MEMORY SNPJDF1MC/16G A6996807 20D6F pictureSALE Any 3 Angry Birds USB Flash Drive Cute 32G memory stick Giftbox
$59.82
SALE Any 3 Angry Birds USB Flash Drive Cute 32G memory stick Giftbox pictureHigh Speed USB 2.0 Micro SD TF T-Flash Memory Card Reader Adapter US
$0.01
High Speed USB 2.0 Micro SD TF T-Flash Memory Card Reader Adapter US picture


Discussions

No Discussions have been posted on this vulnerability.