GLSA-200403-07 : Multiple remote overflows and vulnerabilities in Ethereal

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200403-07
(Multiple remote overflows and vulnerabilities in Ethereal)

There are multiple vulnerabilities in versions of Ethereal earlier than 0.10.3, including:
Thirteen buffer overflows in the following protocol dissectors: NetFlow, IGAP, EIGRP, PGM, IrDA, BGP, ISUP, and TCAP.
A zero-length Presentation protocol selector could make Ethereal crash.
A vulnerability in the RADIUS packet dissector which may crash ethereal.
A corrupt color filter file could cause a segmentation fault.

Impact :

These vulnerabilities may cause Ethereal to crash or may allow an attacker
to run arbitrary code on the user's computer.

Workaround :

While a workaround is not currently known for this issue, all users are
advised to upgrade to the latest version of the affected package.

See also :

http://ethereal.archive.sunet.se/appnotes/enpa-sa-00013.html
http://www.gentoo.org/security/en/glsa/glsa-200403-07.xml

Solution :

All users should upgrade to the current version of the affected package:
# emerge sync
# emerge -pv '>=net-analyzer/ethereal-0.10.3'
# emerge '>=net-analyzer/ethereal-0.10.3'

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 14458 (gentoo_GLSA-200403-07.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0176
CVE-2004-0365
CVE-2004-0367