Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-378: ethereal


Vulnerability Assessment Details

RHSA-2004-378: ethereal

Vulnerability Assessment Summary
Check for the version of the ethereal packages

Detailed Explanation for this Vulnerability Assessment


Updated Ethereal packages that fix various security vulnerabilities are now
available.

Ethereal is a program for monitoring network traffic.

The SNMP dissector in Ethereal releases 0.8.15 through 0.10.4 contained a
memory read flaw. On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash or
possibly execute arbitrary code. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-0635 to this issue.

The SMB dissector in Ethereal releases 0.9.15 through 0.10.4 contained a
null pointer flaw. On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0634 to this issue.

The iSNS dissector in Ethereal releases 0.10.3 through 0.10.4 contained an
integer overflow flaw. On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash or
possibly execute arbitrary code. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-0633 to this issue.

Users of Ethereal should upgrade to these updated packages, which contain
a version that is not vulnerable to these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2004-378.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

IBM 8737E1U IBM.Server Flex System x240 2 x Xeon E5-2620 v2 Six-Core 2.10 GHz Bu
$480.0
IBM 8737E1U IBM.Server Flex System x240 2 x Xeon E5-2620 v2 Six-Core 2.10 GHz Bu pictureIBM 7915AC1-C44 IBM.Server System x3650 M4 Xeon E5 Six-Core 2.00 GHz Bus Speed:
$703.0
IBM 7915AC1-C44 IBM.Server System x3650 M4 Xeon E5 Six-Core 2.00 GHz Bus Speed: pictureIBM 545542U-C1 IBM.Server NeXtScale nx360 M4 No Processor RAM 16 GB 0x No Hard D
$489.0
IBM 545542U-C1 IBM.Server NeXtScale nx360 M4 No Processor RAM 16 GB 0x No Hard D pictureIBM 69Y4392 Rack Mount Server Cable Management Arm NEW Sealed in Box
$10.6
IBM 69Y4392 Rack Mount Server Cable Management Arm NEW Sealed in Box picture


Discussions

No Discussions have been posted on this vulnerability.