Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-03] Ethereal: Numerous vulnerabilities


Vulnerability Assessment Details

[GLSA-200505-03] Ethereal: Numerous vulnerabilities

Vulnerability Assessment Summary
Ethereal: Numerous vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200505-03
(Ethereal: Numerous vulnerabilities)


There are numerous vulnerabilities in versions of Ethereal prior
to 0.10.11, including:
The ANSI A and DHCP dissectors are
vulnerable to format string vulnerabilities.
The DISTCC,
FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit, PKIX
Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation
dissectors are vulnerable to buffer overflows.
The KINK, WSP,
SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON dissectors
are vulnerable to pointer handling errors.
The LMP, KINK,
MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP dissectors are
vulnerable to looping problems.
The Telnet and DHCP dissectors
could abort.
The TZSP, Bittorrent, SMB, MGCP and ISUP
dissectors could cause a segmentation fault.
The WSP, 802.3
Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS, SMB PIPE,
MRDISC and TCAP dissectors could throw assertions.
The DICOM,
NDPS and ICEP dissectors are vulnerable to memory handling errors.
The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP
dissectors could terminate abnormallly.

Impact

A possible hacker might be able to use these vulnerabilities to crash
Ethereal and execute arbitrary code with the permissions of the user
running Ethereal, which could be the root user.

Workaround

There is no known workaround at this time.

References:
http://www.ethereal.com/appnotes/enpa-sa-00019.html
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1456
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1457
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1458
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1459
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1460
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1461
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1462
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1463
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1464
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1465
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1466
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1467
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1468
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1469
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1470


Solution:
All Ethereal users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Synology Diskstation DS216+II Network Attached Storage Server
$150.0
Synology Diskstation DS216+II Network Attached Storage Server pictureCOMPAQ server hard drive 36.4GB 10K RPM BD03663622. New-Sealed
$15.0
COMPAQ server hard drive 36.4GB 10K RPM BD03663622. New-Sealed pictureSamsung 850 EVO M.2 1TB Internal SSD Solid State Drive
$275.95
Samsung 850 EVO M.2 1TB  Internal SSD Solid State Drive pictureKingston Digital 120GB SSDNow UV400 SATA 3 2.5" Solid State Drive SUV400S37/120G
$14.99
Kingston Digital 120GB SSDNow UV400 SATA 3 2.5


Discussions

No Discussions have been posted on this vulnerability.