This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Fedora Core host is missing a security update.
Issues have been discovered in the following protocol dissectors :
- A SIP packet could make Ethereal crash under specific
conditions, as described in the following message:
- The AIM dissector could throw an assertion, causing
Ethereal to terminate abnormally (0.10.3).
- It was possible for the SPNEGO dissector to dereference
a NULL pointer, causing a crash (0.9.8 to 0.10.3).
- The MMSE dissector was susceptible to a buffer
overflow. (0.10.1 to 0.10.3).
All users of the Ethereal package are strongly encouraged to update to
these latest packages.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected ethereal, ethereal-debuginfo and / or
Risk factor :
Family: Fedora Local Security Checks
Nessus Plugin ID: 13713 (fedora_2004-153.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now