|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200604-17] Ethereal: Multiple vulnerabilities in protocol dissectors Vulnerability Assessment Details
|
[GLSA-200604-17] Ethereal: Multiple vulnerabilities in protocol dissectors |
||
Ethereal: Multiple vulnerabilities in protocol dissectors Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200604-17 (Ethereal: Multiple vulnerabilities in protocol dissectors) Coverity discovered numerous vulnerabilities in versions of Ethereal prior to 0.99.0, including: buffer overflows in the ALCAP (CVE-2006-1934), COPS (CVE-2006-1935) and telnet (CVE-2006-1936) dissectors. buffer overflows in the NetXray/Windows Sniffer and Network Instruments file code (CVE-2006-1934). For further details please consult the references below. Impact A possible hacker might be able to exploit these vulnerabilities to crash Ethereal or execute arbitrary code with the permissions of the user running Ethereal, which could be the root user. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1933 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1934 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1935 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1936 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1937 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1938 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1940 http://www.ethereal.com/appnotes/enpa-sa-00023.html Solution: All Ethereal users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.99.0" Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2006 Michel Arboi |
||
Cables, Connectors |
Apple Macintosh Mouse M0100 Platinum 128K 512K Plus – New NOS
$24.95
Macintosh Platinum Mouse - Apple 128K 512K 512Ke Mac Plus Lisa IIe M0100 - NEW
$44.99
1984 APPLE MACINTOSH 128K FIRST MAC Model M0001 ALL WORKING PRINTER & EXTRAS
$2600.00
Apple Macintosh M0001 Computer 1984
$1036.00
Apple Macintosh 128K M0001 Computer 1984 with Mouse and Keyboard
$1299.99
Apple Macintosh 128K M0001 Computer with 128K Label - Estate Sale SOLD AS IS
$2468.10
Apple Macintosh 128K M0110 Computer (1984)
$600.00
Macintosh Plus 1MB with Mouse, Hard Disk 20, Image Writer, & Floppy Disks
$1200.00
NEW IN BOX Apple Macintosh 128K M0130 400K External Mac Floppy Disk Drive 1984
$995.00
Apple Macintosh 128K Parts Kit - P/N 073-0140-A
$273.60
|
||
No Discussions have been posted on this vulnerability. |