FreeBSD : ethereal -- multiple vulnerabilities (efa1344b-5477-11d9-a9e7-0001020eed82)

Medium Nessus Plugin ID 19163


The remote FreeBSD host is missing one or more security-related updates.


An Ethreal Security Advisories reports :

Issues have been discovered in the following protocol dissectors :

- Matthew Bing discovered a bug in DICOM dissection that could make Ethereal crash.

- An invalid RTP timestamp could make Ethereal hang and create a large temporary file, possibly filling available disk space.

- The HTTP dissector could access previously-freed memory, causing a crash.

- Brian Caswell discovered that an improperly formatted SMB packet could make Ethereal hang, maximizing CPU utilization.

Impact: It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire or by convincing someone to read a malformed packet trace file.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 19163

File Name: freebsd_pkg_efa1344b547711d9a9e70001020eed82.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2005/07/13

Modified: 2013/08/09

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ethereal, p-cpe:/a:freebsd:freebsd:ethereal-lite, p-cpe:/a:freebsd:freebsd:tethereal, p-cpe:/a:freebsd:freebsd:tethereal-lite, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2004/12/23

Vulnerability Publication Date: 2004/12/14

Reference Information

CVE: CVE-2004-1139, CVE-2004-1140, CVE-2004-1141, CVE-2004-1142