Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the ethereal packages
Detailed Explanation for this Vulnerability Assessment
Updated ethereal packages are available which fix several security problems.
Ethereal is a package designed for monitoring network traffic on your
system. Several security issues have been found in the Ethereal packages
distributed with Red Hat Linux Advanced Server:
Buffer overflow in Ethereal 0.9.5 and earlier permits remote attackers to
cause a denial of service or execute arbitrary code via the ISIS dissector.
Buffer overflows in Ethereal 0.9.4 and earlier permits remote attackers
to cause a denial of service or execute arbitrary code via (1) the BGP
dissector, or (2) the WCP dissector. (CVE-2002-0821)
Ethereal 0.9.4 and earlier permits remote attackers to cause a denial
of service and possibly excecute arbitrary code via the (1) SOCKS, (2)
RSVP, (3) AFS, or (4) LMP dissectors, which can be caused to core
A buffer overflow in the X11 dissector in Ethereal before 0.9.4 permits
remote attackers to cause a denial of service (crash) and possibly
execute arbitrary code while Ethereal is parsing keysyms. (CVE-2002-0402)
The DNS dissector in Ethereal before 0.9.4 permits remote attackers to
cause a denial of service (CPU consumption) via a malformed packet
that causes Ethereal to enter an infinite loop. (CVE-2002-0403)
A vulnerability in the GIOP dissector in Ethereal before 0.9.4 permits
remote attackers to cause a denial of service (memory consumption).
Users of Ethereal should update to the errata packages containing Ethereal
version 0.9.6 which is not vulnerable to these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2002-170.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|Dell THP56 LSI MegaRAID 9265-8i 6Gb/s SAS RAID Controller with SFF Bracket
|Asus Zenbook UX32vd, Core i7-3517U, 10 GB RAM, 128+128 GB SSDs RAID 0
|Dell 03NDP MegaRaid 9260-8i 6Gb/s SAS SATA PCI-e RAID Controller
|HighPoint RocketRAID 2720SGL 8-Port SAS 6Gb/s PCIe 2.0 x8 RAID HBA -READ-
No Discussions have been posted on this vulnerability.