|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200510-25] Ethereal: Multiple vulnerabilities in protocol dissectors Vulnerability Assessment Details
|
[GLSA-200510-25] Ethereal: Multiple vulnerabilities in protocol dissectors |
||
Ethereal: Multiple vulnerabilities in protocol dissectors Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200510-25 (Ethereal: Multiple vulnerabilities in protocol dissectors) There are numerous vulnerabilities in versions of Ethereal prior to 0.10.13, including: The SLIM3 and AgentX dissectors could overflow a buffer (CVE-2005-3243). iDEFENSE discovered a buffer overflow in the SRVLOC dissector (CVE-2005-3184). Multiple potential crashes in many dissectors have been fixed, see References for further details. Furthermore an infinite loop was discovered in the IRC protocol dissector of the 0.10.13 release (CVE-2005-3313). Impact A possible hacker might be able to use these vulnerabilities to crash Ethereal or execute arbitrary code with the permissions of the user running Ethereal, which could be the root user. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3184 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3241 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3242 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3246 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3247 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3313 http://www.ethereal.com/appnotes/enpa-sa-00021.html Solution: All Ethereal users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.13-r1" Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID
$58.99
Intel PCIe SSD AIC RAID Controller Card G97168-252
$44.55
Cisco UCS LSI MegaRAID 9271CV-8I SAS2308 PCIe SAS Internal RAID Controller
$28.00
Oracle 7085209 LSI MegaRAID SAS 9361-8i 1GB Cache 12Gbps SAS/SATA PCIe RAID Card
$28.20
Inspur LSI 9300-8i Raid Card 12Gbps HBA HDD Controller High Profile IT MODE
$15.98
LSI MegaRAID 9361-8i 12Gb PCIe 8-Port SAS/SATA RAID 1Gb w/BBU/CacheVault/License
$39.95
LSI MegaRAID 9361-8i 12Gbps PCIe 3 x8 SATA SAS 3 8 Port RAID + BBU & CacheVault
$39.00
ORICO Multi Bay RAID Hard Drive Enclosure USB 3.0/ Type-C For 2.5/3.5'' HDD SSDs
$82.49
4 Bay RAID External Hard Drive Enclosure for 2.5/3.5" SATA HDD/SSD
$79.99
2 Bay RAID Hard Drive Enclosure USB 3.0 Type-B for 2.5" SATA SSD/HDD Enclosure
$59.99
|
||
No Discussions have been posted on this vulnerability. |