Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-03] Ethereal: Numerous vulnerabilities


Vulnerability Assessment Details

[GLSA-200505-03] Ethereal: Numerous vulnerabilities

Vulnerability Assessment Summary
Ethereal: Numerous vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200505-03
(Ethereal: Numerous vulnerabilities)


There are numerous vulnerabilities in versions of Ethereal prior
to 0.10.11, including:
The ANSI A and DHCP dissectors are
vulnerable to format string vulnerabilities.
The DISTCC,
FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit, PKIX
Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation
dissectors are vulnerable to buffer overflows.
The KINK, WSP,
SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON dissectors
are vulnerable to pointer handling errors.
The LMP, KINK,
MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP dissectors are
vulnerable to looping problems.
The Telnet and DHCP dissectors
could abort.
The TZSP, Bittorrent, SMB, MGCP and ISUP
dissectors could cause a segmentation fault.
The WSP, 802.3
Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS, SMB PIPE,
MRDISC and TCAP dissectors could throw assertions.
The DICOM,
NDPS and ICEP dissectors are vulnerable to memory handling errors.
The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP
dissectors could terminate abnormallly.

Impact

A possible hacker might be able to use these vulnerabilities to crash
Ethereal and execute arbitrary code with the permissions of the user
running Ethereal, which could be the root user.

Workaround

There is no known workaround at this time.

References:
http://www.ethereal.com/appnotes/enpa-sa-00019.html
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1456
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1457
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1458
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1459
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1460
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1461
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1462
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1463
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1464
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1465
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1466
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1467
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1468
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1469
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1470


Solution:
All Ethereal users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

PNY CS1311 240GB SATA III 6Gb/s 2.5" Internal Solid State Drive (SSD) - SSD7CS13
$99.0
PNY CS1311 240GB SATA III 6Gb/s 2.5HornetTek Viper 2TB 2000GB 64MB Cache 7200RPM SuperSpeed USB 3.0/2.0 External
$109.74
HornetTek Viper 2TB 2000GB 64MB Cache 7200RPM SuperSpeed USB 3.0/2.0 External pictureIBM Clean Pull 300GB 15K RPM 4Gb Fibre FC Hard Drive w/Tray 42d0413 9FL004-039
$29.99
IBM Clean Pull 300GB 15K RPM 4Gb Fibre FC Hard Drive w/Tray 42d0413 9FL004-039 pictureSeagate Barracuda ATA IV 20GB Internal 7200RPM 3.5" (ST320011A) HDD
$5.43
Seagate Barracuda ATA IV 20GB Internal 7200RPM 3.5


Discussions

No Discussions have been posted on this vulnerability.