|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-03] Ethereal: Numerous vulnerabilities Vulnerability Assessment Details
|
[GLSA-200505-03] Ethereal: Numerous vulnerabilities |
||
Ethereal: Numerous vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200505-03 (Ethereal: Numerous vulnerabilities) There are numerous vulnerabilities in versions of Ethereal prior to 0.10.11, including: The ANSI A and DHCP dissectors are vulnerable to format string vulnerabilities. The DISTCC, FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit, PKIX Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation dissectors are vulnerable to buffer overflows. The KINK, WSP, SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON dissectors are vulnerable to pointer handling errors. The LMP, KINK, MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP dissectors are vulnerable to looping problems. The Telnet and DHCP dissectors could abort. The TZSP, Bittorrent, SMB, MGCP and ISUP dissectors could cause a segmentation fault. The WSP, 802.3 Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS, SMB PIPE, MRDISC and TCAP dissectors could throw assertions. The DICOM, NDPS and ICEP dissectors are vulnerable to memory handling errors. The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP dissectors could terminate abnormallly. Impact A possible hacker might be able to use these vulnerabilities to crash Ethereal and execute arbitrary code with the permissions of the user running Ethereal, which could be the root user. Workaround There is no known workaround at this time. References: http://www.ethereal.com/appnotes/enpa-sa-00019.html http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1456 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1457 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1458 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1459 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1460 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1461 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1462 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1463 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1464 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1465 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1466 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1467 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1468 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1469 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1470 Solution: All Ethereal users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11" Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
LSI 9305-16i SATA SAS 12Gbs RAID Controller PCIe 3.0 x8 IT-Mode 4* 8643 SATA
$229.99
HPE 869102-001 Smart Array E208i-a SR Gen10 Storage Controller RAID SP: 871039
$116.99
Lot of 4 - Genuine Dell (62P9H) PERC H710 512MB Mini Blade 6Gbps SAS Raid
$44.99
Lot of 2 -Dell P2R3R PERC H330 Mini Mono 12Gbps SAS Non-raid Controller 0P2R3R
$35.99
Inspur LSI 9300-8i Raid Card 12Gbps HBA HDD Controller High Profile IT MODE
$15.98
LSI MegaRAID 9361-8i 12Gb PCIe 8-Port SAS/SATA RAID 1Gb w/BBU/CacheVault/License
$39.95
LSI MegaRAID 9361-8i 12Gbps PCIe 3 x8 SATA SAS 3 8 Port RAID + BBU & CacheVault
$39.00
ORICO Multi Bay RAID Hard Drive Enclosure USB 3.0/ Type-C For 2.5/3.5'' HDD SSDs
$82.49
ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID
$58.99
NEW LSI MEGARAID SAS 9361-8i 12GB/s SAS + SATA RAID CONTROLLER CARD PCIe x8 3.0
$99.00
|
||
No Discussions have been posted on this vulnerability. |