Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-136: ethereal


Vulnerability Assessment Details

RHSA-2004-136: ethereal

Vulnerability Assessment Summary
Check for the version of the ethereal packages

Detailed Explanation for this Vulnerability Assessment


Updated Ethereal packages that fix various security vulnerabilities are now
available.

Ethereal is a program for monitoring network traffic.

Stefan Esser reported that Ethereal versions 0.10.1 and earlier contain
stack overflows in the IGRP, PGM, Metflow, ISUP, TCAP, or IGAP dissectors.
On a system where Ethereal is being run a remote attacker could send
malicious packets that could cause Ethereal to crash or execute arbitrary
code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0176 to this issue.

Jonathan Heussser discovered that a carefully-crafted RADIUS packet could
cause a crash. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0365 to this issue.

Ethereal 0.8.13 to 0.10.2 permits remote attackers to cause a denial of
service (crash) via a zero-length Presentation protocol selector. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-0367 to this issue.

Users of Ethereal should upgrade to these updated packages, which contain
a version of Ethereal that is not vulnerable to these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2004-136.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

NEW Sealed Juniper 1100W JPSU-1100-AC-AFO Power Supply DPS-1100CB
$199.99
NEW Sealed Juniper 1100W JPSU-1100-AC-AFO Power Supply DPS-1100CB   pictureJuniper Networks EX3200-48P 750-021260 48-port PoE Gigabit 930W Supply 4x GE SFP
$199.98
Juniper Networks EX3200-48P 750-021260 48-port PoE Gigabit 930W Supply 4x GE SFP pictureJuniper Networks EX3200-48P 750-021260 48-port PoE Gigabit 930W Supply 4x GE SFP
$199.99
Juniper Networks EX3200-48P 750-021260 48-port PoE Gigabit 930W Supply 4x GE SFP pictureNew JUNIPER Trapeze MP522 WLA522-US Juniper 802.11n 300 Mb Wireless Access Point
$50.0
New JUNIPER Trapeze MP522 WLA522-US Juniper 802.11n 300 Mb Wireless Access Point picture


Discussions

No Discussions have been posted on this vulnerability.