Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 74466 - Ethereal Multiple Vulnerabilities
Summary: Ethereal Multiple Vulnerabilities
Status: RESOLVED DUPLICATE of bug 74443
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2004-12-15 03:59 UTC by Aarni Honka
Modified: 2005-07-17 13:06 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aarni Honka 2004-12-15 03:59:44 UTC
TITLE:
Ethereal Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA13468

VERIFY ADVISORY:
http://secunia.com/advisories/13468/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
From remote

SOFTWARE:
Ethereal 0.x
http://secunia.com/product/1228/

DESCRIPTION:
Multiple vulnerabilities have been reported in Ethereal, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

1) An unspecified error within the DICOM dissector can be exploited
to crash Ethereal.

The vulnerability affects versions 0.10.4 through 0.10.7.

2) An unspecified error within the handling of RTP timestamps can be
exploited to cause Ethereal to stop responding and create a large
temporary file, which may consume all available disk space.

The vulnerability affects versions 0.9.16 through 0.10.7.

3) An unspecified error within the HTTP dissector may result in freed
memory being accessed, which causes Ethereal to crash.

The vulnerability affects versions 0.10.1 through 0.10.7.

4) An unspecified error within the SMB dissector can be exploited via
a specially crafted SMB packet to cause Ethereal to stop responding
and consume a large amount of CPU resources.

The vulnerability affects versions 0.9.0 through 0.10.7.

NOTE: According to the vendor's advisory, some of the vulnerabilities
may also possibly be exploited to execute arbitrary code.

SOLUTION:
Update to version 0.10.8.
http://www.ethereal.com/download.html

PROVIDED AND/OR DISCOVERED BY:
1) Matthew Bing
2) Reported by vendor.
3) Reported by vendor.
4) Brian Caswell

ORIGINAL ADVISORY:
http://www.ethereal.com/appnotes/enpa-sa-00016.html
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-12-15 04:01:55 UTC
Thx Aarni for the report.

*** This bug has been marked as a duplicate of 74443 ***