|Category:||Conectiva Local Security Checks|
|Title:||Conectiva Security Advisory CLA-2002:474|
|Summary:||Conectiva Security Advisory CLA-2002:474|
The remote host is missing updates announced in
Ethereal is a powerful network traffic analyzer with an intuitive
This update addresses two vulnerabilities stated in ethereal's home
1.SNMP and LDAP string handling
The PROTOS test suite developed by the Oulu University Secure
Programming Group found some flaws in SNMP and LDAP protocols support
in ethereal. It may be possible to crash or execute arbitrary code in
the ethereal's context (ethereal is usually run by root) by injecting
crafted packets in the network or convincing someone to open a trace
file with such packets.
2.ASN.1 zero-length g_malloc
Due to improper string parsing in ASN.1 routines, it is possible to
crash ethereal by inserting malformed packets in the wire or by
opening a trace file with such packets inside. SNMP, LDAP, COPS and
Kerberos parsers use the ASN routines to handle traffic.
There's also a third vulnerability reported in ethereal's home page
related to zlib's double free bug, which have been addressed already
by our zlib's advisory some time ago.
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'
Risk factor : High
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 40605 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.