Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50663
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2004:024 (ethereal)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to ethereal
announced via advisory MDKSA-2004:024.

A number of serious issues have been discovered in versions of Ethereal
prior to 0.10.2. Stefan Esser discovered thirteen buffer overflows in
the NetFlow, IGAP, EIGRP, PGM, IrDA, BGP, ISUP, and TCAP dissectors.
Jonathan Heusser discovered that a carefully-crafted RADIUS packet
could cause Ethereal to crash. It was also found that a zero-length
Presentation protocol selector could make Ethereal crash. Finally, a
corrupt color filter file could cause a segmentation fault. It is
possible, through the exploitation of some of these vulnerabilities, to
cause Ethereal to crash or run arbitrary code by injecting a malicious,
malformed packet onto the wire, by convincing someone to read a
malformed packet trace file, or by creating a malformed color filter
file.

The updated packages bring Ethereal to version 0.10.3 which is not
vulnerable to these issues.

Affected versions: 9.1, 9.2

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-01767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0367
http://www.ethereal.com/appnotes/enpa-sa-00013.html

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0176
Bugtraq: 20040323 Advisory 03/2004: Multiple (13) Ethereal remote overflows (Google Search)
http://marc.info/?l=bugtraq&m=108007072215742&w=2
Bugtraq: 20040329 LNSA-#2004-0007: Multiple security problems in Ethereal (Google Search)
http://marc.info/?l=bugtraq&m=108058005324316&w=2
Bugtraq: 20040416 [OpenPKG-SA-2004.015] OpenPKG Security Advisory (ethereal) (Google Search)
http://marc.info/?l=bugtraq&m=108213710306260&w=2
CERT/CC vulnerability note: VU#119876
http://www.kb.cert.org/vuls/id/119876
CERT/CC vulnerability note: VU#125156
http://www.kb.cert.org/vuls/id/125156
CERT/CC vulnerability note: VU#433596
http://www.kb.cert.org/vuls/id/433596
CERT/CC vulnerability note: VU#591820
http://www.kb.cert.org/vuls/id/591820
CERT/CC vulnerability note: VU#644886
http://www.kb.cert.org/vuls/id/644886
CERT/CC vulnerability note: VU#659140
http://www.kb.cert.org/vuls/id/659140
CERT/CC vulnerability note: VU#740188
http://www.kb.cert.org/vuls/id/740188
CERT/CC vulnerability note: VU#864884
http://www.kb.cert.org/vuls/id/864884
CERT/CC vulnerability note: VU#931588
http://www.kb.cert.org/vuls/id/931588
Conectiva Linux advisory: CLA-2004:835
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835
Debian Security Information: DSA-511 (Google Search)
http://www.debian.org/security/2004/dsa-511
http://security.gentoo.org/glsa/glsa-200403-07.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2004:024
http://security.e-matters.de/advisories/032004.html
http://www.osvdb.org/6893
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10187
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887
http://www.redhat.com/support/errata/RHSA-2004-136.html
http://www.redhat.com/support/errata/RHSA-2004-137.html
http://secunia.com/advisories/11185
XForce ISS Database: ethereal-multiple-dissectors-bo(15569)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15569
Common Vulnerability Exposure (CVE) ID: CVE-2004-0365
CERT/CC vulnerability note: VU#124454
http://www.kb.cert.org/vuls/id/124454
http://marc.info/?l=ethereal-dev&m=107962966700423&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A879
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A891
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9196
XForce ISS Database: ethereal-radius-dos(15571)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15571
Common Vulnerability Exposure (CVE) ID: CVE-2004-0367
CERT/CC vulnerability note: VU#792286
http://www.kb.cert.org/vuls/id/792286
http://www.ethereal.com/lists/ethereal-dev/200404/msg00296.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11071
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A880
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A905
XForce ISS Database: ethereal-zero-presentation-dos(15570)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15570
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.