Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:083: ethereal


Vulnerability Assessment Details

MDKSA-2005:083: ethereal

Vulnerability Assessment Summary
Check for the version of the ethereal package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:083 (ethereal).



A number of vulnerabilities were discovered in previous version of Ethereal
that have been fixed in the 0.10.11 release, including:

- The ANSI A and DHCP dissectors are vulnerable to format string
vulnerabilities.

- The DISTCC, FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit,
PKIX Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation
dissectors are vulnerable to buffer overflows.

- The KINK, WSP, SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON
dissectors are vulnerable to pointer handling errors.

- The LMP, KINK, MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP
dissectors are vulnerable to looping problems.

- The Telnet and DHCP dissectors could abort.

- The TZSP, Bittorrent, SMB, MGCP and ISUP dissectors could cause a
segmentation fault.

- The WSP, 802.3 Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS,
SMB PIPE, MRDISC and TCAP dissectors could throw assertions.

- The DICOM, NDPS and ICEP dissectors are vulnerable to memory handling errors.

- The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP dissectors
could terminate abnormallly.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:083
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

WAVLINK USB 3.0 Universal Docking Station Hard Drive Docking Station. O1
$27.35
WAVLINK USB 3.0 Universal Docking Station Hard Drive Docking Station. O1 pictureHP Pavilion p6232p - 320GB Hard Drive - Windows 7 Ultimate 64 Bit
$64.77
HP Pavilion p6232p - 320GB Hard Drive - Windows 7 Ultimate 64 Bit  pictureCrucial M4 256GB Internal 2.5" (CT256M4SSD2) SSD
$18.0
Crucial M4 256GB Internal 2.5HP Pavilion p6250t - 320GB Hard Drive - Windows 7 Professional 64 Bit
$64.77
HP Pavilion p6250t - 320GB Hard Drive - Windows 7 Professional 64 Bit picture


Discussions

No Discussions have been posted on this vulnerability.