Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-03] Ethereal: Numerous vulnerabilities


Vulnerability Assessment Details

[GLSA-200505-03] Ethereal: Numerous vulnerabilities

Vulnerability Assessment Summary
Ethereal: Numerous vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200505-03
(Ethereal: Numerous vulnerabilities)


There are numerous vulnerabilities in versions of Ethereal prior
to 0.10.11, including:
The ANSI A and DHCP dissectors are
vulnerable to format string vulnerabilities.
The DISTCC,
FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit, PKIX
Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation
dissectors are vulnerable to buffer overflows.
The KINK, WSP,
SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON dissectors
are vulnerable to pointer handling errors.
The LMP, KINK,
MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP dissectors are
vulnerable to looping problems.
The Telnet and DHCP dissectors
could abort.
The TZSP, Bittorrent, SMB, MGCP and ISUP
dissectors could cause a segmentation fault.
The WSP, 802.3
Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS, SMB PIPE,
MRDISC and TCAP dissectors could throw assertions.
The DICOM,
NDPS and ICEP dissectors are vulnerable to memory handling errors.
The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP
dissectors could terminate abnormallly.

Impact

A possible hacker might be able to use these vulnerabilities to crash
Ethereal and execute arbitrary code with the permissions of the user
running Ethereal, which could be the root user.

Workaround

There is no known workaround at this time.

References:
http://www.ethereal.com/appnotes/enpa-sa-00019.html
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1456
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1457
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1458
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1459
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1460
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1461
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1462
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1463
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1464
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1465
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1466
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1467
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1468
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1469
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1470


Solution:
All Ethereal users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors


Western Digital 1TB WD Blue PC Desktop 3.5'' Internal CMR Hard Drive - WD10EARZ picture

Western Digital 1TB WD Blue PC Desktop 3.5'' Internal CMR Hard Drive - WD10EARZ

$44.99



2TB 1TB TYPE-C OTG Stick 4 in 1 USB Memory Photo Stick Android Samsung Pen Drive picture

2TB 1TB TYPE-C OTG Stick 4 in 1 USB Memory Photo Stick Android Samsung Pen Drive

$28.89



1TB Samsung 840 EVO Internal 2.5

1TB Samsung 840 EVO Internal 2.5" SATA III SSD MZ7TE1T0HMHP Solid State Drive

$78.95



WD_BLACK 1TB SN850X NVMe SSD, Internal Gaming Solid State Drive - WDS100T2X0E picture

WD_BLACK 1TB SN850X NVMe SSD, Internal Gaming Solid State Drive - WDS100T2X0E

$99.99



Samsung - 980 PRO 1TB Internal Gaming SSD PCIe Gen 4 x4 NVMe picture

Samsung - 980 PRO 1TB Internal Gaming SSD PCIe Gen 4 x4 NVMe

$109.99



1000 GB HHD 2.5

1000 GB HHD 2.5" 1TB Mixed Brands Samsung WD HGST TOSHIBA, Tested Formatted

$14.90



Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5

Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5" SATA 3 6GB/s Internal SSD PC/MAC Lot

$19.99



Samsung - Geek Squad Certified Refurbished 870 EVO 1TB SATA Solid State Drive picture

Samsung - Geek Squad Certified Refurbished 870 EVO 1TB SATA Solid State Drive

$67.99



1TB/2TB USB 3.0 Flash Drive Thumb U Disk Memory Stick Pen PC Laptop Storage lot picture

1TB/2TB USB 3.0 Flash Drive Thumb U Disk Memory Stick Pen PC Laptop Storage lot

$580.99



2 PACK  Seagate ST1000LM035 Mobile HDD 1TB 2.5

2 PACK Seagate ST1000LM035 Mobile HDD 1TB 2.5" SATA III Laptop Hard Drive

$26.89



Discussions

No Discussions have been posted on this vulnerability.