Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the ethereal packages
Detailed Explanation for this Vulnerability Assessment
Updated ethereal packages are available which fix several security problems.
Ethereal is a package designed for monitoring network traffic on your
system. Several security issues have been found in the Ethereal packages
distributed with Red Hat Linux Advanced Server:
Buffer overflow in Ethereal 0.9.5 and earlier permits remote attackers to
cause a denial of service or execute arbitrary code via the ISIS dissector.
Buffer overflows in Ethereal 0.9.4 and earlier permits remote attackers
to cause a denial of service or execute arbitrary code via (1) the BGP
dissector, or (2) the WCP dissector. (CVE-2002-0821)
Ethereal 0.9.4 and earlier permits remote attackers to cause a denial
of service and possibly excecute arbitrary code via the (1) SOCKS, (2)
RSVP, (3) AFS, or (4) LMP dissectors, which can be caused to core
A buffer overflow in the X11 dissector in Ethereal before 0.9.4 permits
remote attackers to cause a denial of service (crash) and possibly
execute arbitrary code while Ethereal is parsing keysyms. (CVE-2002-0402)
The DNS dissector in Ethereal before 0.9.4 permits remote attackers to
cause a denial of service (CPU consumption) via a malformed packet
that causes Ethereal to enter an infinite loop. (CVE-2002-0403)
A vulnerability in the GIOP dissector in Ethereal before 0.9.4 permits
remote attackers to cause a denial of service (memory consumption).
Users of Ethereal should update to the errata packages containing Ethereal
version 0.9.6 which is not vulnerable to these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2002-170.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|Digium D40 VoIP Black Backlit Display HD Voice Phone NIB
|Dialogic DMIP241-1T1 PCIW 100BT VOIP - DMIP2411T1100 BTPCIW 882-707
|Yealink YEA-W52P Business HD IP Dect Cordless Voip Phone and Device (SIP-W52P)
|Vonage VDV23-VD VoIP Telephone Service Adapter
No Discussions have been posted on this vulnerability.