Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:083: ethereal


Vulnerability Assessment Details

MDKSA-2005:083: ethereal

Vulnerability Assessment Summary
Check for the version of the ethereal package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:083 (ethereal).



A number of vulnerabilities were discovered in previous version of Ethereal
that have been fixed in the 0.10.11 release, including:

- The ANSI A and DHCP dissectors are vulnerable to format string
vulnerabilities.

- The DISTCC, FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit,
PKIX Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation
dissectors are vulnerable to buffer overflows.

- The KINK, WSP, SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON
dissectors are vulnerable to pointer handling errors.

- The LMP, KINK, MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP
dissectors are vulnerable to looping problems.

- The Telnet and DHCP dissectors could abort.

- The TZSP, Bittorrent, SMB, MGCP and ISUP dissectors could cause a
segmentation fault.

- The WSP, 802.3 Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS,
SMB PIPE, MRDISC and TCAP dissectors could throw assertions.

- The DICOM, NDPS and ICEP dissectors are vulnerable to memory handling errors.

- The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP dissectors
could terminate abnormallly.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:083
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Microsoft Windows Server 2016 Essentials Raid 1 Office Business -25 Users (G12)
$1249.0
Microsoft Windows Server 2016 Essentials Raid 1 Office Business -25 Users  (G12) pictureWD 6TB My Book Duo Desktop RAID External Hard Drive - USB 3.0 - WDBLWE0060JCH
$129.98
WD 6TB My Book Duo Desktop RAID External Hard Drive - USB 3.0 - WDBLWE0060JCH pictureAPPLE XSERVE RAID POWER SUPPLY 450W 620-2107 A1009~FREE SHIP
$47.63
APPLE XSERVE RAID POWER SUPPLY 450W 620-2107 A1009~FREE SHIP  pictureG-Technology G-RAID with Thunderbolt Dual Drive Enclosure (Diskless 0TB)
$0.01
G-Technology G-RAID with Thunderbolt Dual Drive Enclosure (Diskless 0TB) picture


Discussions

No Discussions have been posted on this vulnerability.