|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200604-17] Ethereal: Multiple vulnerabilities in protocol dissectors Vulnerability Scan
Vulnerability Scan Summary Ethereal: Multiple vulnerabilities in protocol dissectors
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200604-17
(Ethereal: Multiple vulnerabilities in protocol dissectors)
Coverity discovered numerous vulnerabilities in versions of
Ethereal prior to 0.99.0, including:
buffer overflows in the ALCAP (CVE-2006-1934), COPS (CVE-2006-1935)
and telnet (CVE-2006-1936) dissectors.
buffer overflows
in the NetXray/Windows Sniffer and Network Instruments file code
(CVE-2006-1934).
For further details please consult the
references below.
Impact
A possible hacker might be able to exploit these vulnerabilities to crash
Ethereal or execute arbitrary code with the permissions of the user
running Ethereal, which could be the root user.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1933
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1934
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1938
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1939
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1940
http://www.ethereal.com/appnotes/enpa-sa-00023.html
Solution:
All Ethereal users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.99.0"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|