How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated Ethereal packages that fix various security vulnerabilities
are now available.
Ethereal is a program for monitoring network traffic.
The MMSE dissector in Ethereal releases 0.10.1 through 0.10.3
contained a buffer overflow flaw. On a system where Ethereal is
running, a remote attacker could send malicious packets that could
cause Ethereal to crash or execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2004-0507 to this issue.
In addition, other flaws in Ethereal prior to 0.10.4 were found that
could cause it to crash in response to carefully crafted SIP
(CVE-2004-0504), AIM (CVE-2004-0505), or SPNEGO (CVE-2004-0506)
Users of Ethereal should upgrade to these updated packages, which
contain backported security patches that correct these issues.
See also :
Update the affected ethereal and / or ethereal-gnome packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12501 ()
CVE ID: CVE-2004-0504CVE-2004-0505CVE-2004-0506CVE-2004-0507
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.