Descripción: | Description:
The remote host is missing updates announced in advisory CLA-2005:916.
Ethereal[1] is a powerful network traffic analyzer with a graphical user interface (GUI).
This update fixes several vulnerabilities[2,3,4] in ethereal:
CVE-2004-0633: The iSNS dissector for ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.
CVE-2004-0634: The SMB SID snooping capability in ethereal 0.9.15 to 0.10.4 allows remote attackers to cause a denial of service (process abort) via a handle without a policy name, which causes a null dereference.
CVE-2004-0635: The SNMP dissector in ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via a malformed request or by missing community string, which causes an out-of-bounds read.
CVE-2004-0504: ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients.
CVE-2004-0505: The AIM dissector in ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error).
CVE-2004-0506: The SPNEGO dissector in ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (abort).
CVE-2004-0507: Buffer overflow in the MMSE dissector for ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.
CVE-2004-1139: Matthew Bing found a problem in DICOM dissection that could make Ethereal exit unexpectedly.
CVE-2004-1140: An invalid RTP timestamp could make Ethereal hang and create a large temporary file, possibly filling all available disk space.
CVE-2004-1141: The HTTP dissector could access previously-freed memory, making Ethereal exit unexpectedly.
CVE-2004-1142: Brian Caswell discovered that an improperly formatted SMB packet could make Ethereal hang, maximizing CPU utilization.
Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade'
http://www.ethereal.com/ http://www.ethereal.com/appnotes/enpa-sa-00014.html http://www.ethereal.com/appnotes/enpa-sa-00015.html http://www.ethereal.com/appnotes/enpa-sa-00016.html http://www.securityspace.com/smysecure/catid.html?in=CLA-2005:916 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000916
Risk factor : Critical
CVSS Score: 10.0
|