![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50770 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDKSA-2003:114 (ethereal) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to ethereal announced via advisory MDKSA-2003:114. A number of vulnerabilities were discovered in ethereal that, if exploited, could be used to make ethereal crash or run arbitrary code by injecting malicious malformed packets onto the wire or by convincing someone to read a malformed packet trace file. A buffer overflow allows attackers to cause a DoS (Denial of Service) and possibly execute arbitrary code using a malformed GTP MSISDN string (CVE-2003-0925). Likewise, a DoS can be caused by using malformed ISAKMP or MEGACO packets (CVE-2003-0926). Finally, a heap-based buffer overflow allows attackers to cause a DoS or execute arbitrary code using the SOCKS dissector (CVE-2003-0927). All three vulnerabilities affect all versions of Ethereal up to and including 0.9.15. This update provides 0.9.16 which corrects all of these issues. Also note that each vulnerability can be exploited by a remote attacker. Affected versions: 9.1, 9.2 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2003:114 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0925 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0926 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0927 http://www.ethereal.com/appnotes/enpa-sa-00011.html Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0925 BugTraq ID: 8951 http://www.securityfocus.com/bid/8951 Conectiva Linux advisory: CLA-2003:780 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000780 Debian Security Information: DSA-407 (Google Search) http://www.debian.org/security/2003/dsa-407 http://www.mandriva.com/security/advisories?name=MDKSA-2003:114 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9692 http://www.redhat.com/support/errata/RHSA-2003-323.html http://www.redhat.com/support/errata/RHSA-2003-324.html http://secunia.com/advisories/10531 TurboLinux Advisory: TLSA-2003-64 http://www.turbolinux.com/security/TLSA-2003-64.txt Common Vulnerability Exposure (CVE) ID: CVE-2003-0926 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11648 Common Vulnerability Exposure (CVE) ID: CVE-2003-0927 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9691 XForce ISS Database: ethereal-socks-heap-overflow(13578) https://exchange.xforce.ibmcloud.com/vulnerabilities/13578 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |