Mandrake Linux Security Advisory : ethereal (MDKSA-2004:024)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing a security update.

Description :

A number of serious issues have been discovered in versions of
Ethereal prior to 0.10.2. Stefan Esser discovered thirteen buffer
overflows in the NetFlow, IGAP, EIGRP, PGM, IrDA, BGP, ISUP, and TCAP
dissectors. Jonathan Heusser discovered that a carefully-crafted
RADIUS packet could cause Ethereal to crash. It was also found that a
zero-length Presentation protocol selector could make Ethereal crash.
Finally, a corrupt color filter file could cause a segmentation fault.
It is possible, through the exploitation of some of these
vulnerabilities, to cause Ethereal to crash or run arbitrary code by
injecting a malicious, malformed packet onto the wire, by convincing
someone to read a malformed packet trace file, or by creating a
malformed color filter file.

The updated packages bring Ethereal to version 0.10.3 which is not
vulnerable to these issues.

See also :

http://ethereal.archive.sunet.se/appnotes/enpa-sa-00013.html

Solution :

Update the affected ethereal package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 14123 (mandrake_MDKSA-2004-024.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0176
CVE-2004-0365
CVE-2004-0367

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now