RHEL 2.1 / 3 : ethereal (RHSA-2004:378)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated Ethereal packages that fix various security vulnerabilities
are now available.

Ethereal is a program for monitoring network traffic.

The SNMP dissector in Ethereal releases 0.8.15 through 0.10.4
contained a memory read flaw. On a system where Ethereal is running, a
remote attacker could send malicious packets that could cause Ethereal
to crash or possibly execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2004-0635 to this issue.

The SMB dissector in Ethereal releases 0.9.15 through 0.10.4 contained
a NULL pointer flaw. On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to
crash. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0634 to this issue.

The iSNS dissector in Ethereal releases 0.10.3 through 0.10.4
contained an integer overflow flaw. On a system where Ethereal is
running, a remote attacker could send malicious packets that could
cause Ethereal to crash or possibly execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2004-0633 to this issue.

Users of Ethereal should upgrade to these updated packages, which
contain a version that is not vulnerable to these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2004-0633.html
https://www.redhat.com/security/data/cve/CVE-2004-0634.html
https://www.redhat.com/security/data/cve/CVE-2004-0635.html
http://ethereal.archive.sunet.se/appnotes/enpa-sa-00015.html
http://rhn.redhat.com/errata/RHSA-2004-378.html

Solution :

Update the affected ethereal and / or ethereal-gnome packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 14215 ()

Bugtraq ID:

CVE ID: CVE-2004-0633
CVE-2004-0634
CVE-2004-0635