Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51509
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2002:474
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2002:474.

Ethereal is a powerful network traffic analyzer with an intuitive
interface.

This update addresses two vulnerabilities stated in ethereal's home
page:

1.SNMP and LDAP string handling[1]
The PROTOS[2] test suite developed by the Oulu University Secure
Programming Group found some flaws in SNMP and LDAP protocols support
in ethereal. It may be possible to crash or execute arbitrary code in
the ethereal's context (ethereal is usually run by root) by injecting
crafted packets in the network or convincing someone to open a trace
file with such packets.

2.ASN.1 zero-length g_malloc[3]
Due to improper string parsing in ASN.1 routines, it is possible to
crash ethereal by inserting malformed packets in the wire or by
opening a trace file with such packets inside. SNMP, LDAP, COPS and
Kerberos parsers use the ASN routines to handle traffic.

There's also a third vulnerability reported in ethereal's home page
related to zlib's double free bug, which have been addressed already
by our zlib's advisory[4] some time ago.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.ethereal.com/appnotes/enpa-sa-00001.html
http://www.ee.oulu.fi/research/ouspg/protos
http://www.ethereal.com/appnotes/enpa-sa-00003.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469&idioma=en
http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:474
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.