Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Debian Security Advisory DSA 853-1 (ethereal)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to ethereal announced via advisory DSA 853-1. Several security problems have been discovered in ethereal, a commonly used network traffic analyser. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-2360 Memory allocation errors in the LDAP dissector can cause a denial of service. CVE-2005-2361 Various errors in the AgentX, PER, DOCSIS, RADIUS, Telnet, IS-IS, HTTP, DCERPC, DHCP and SCTP dissectors can cause a denial of service. CVE-2005-2363 Various errors in the SMPP, 802.3, H1 and DHCP dissectors can cause a denial of service. CVE-2005-2364 Null pointer dereferences in the WBXML and GIOP dissectors can cause a denial of service. CVE-2005-2365 A buffer overflow and null pointer dereferences in the SMB dissector can cause a denial of service. CVE-2005-2366 Wrong address calculation in the BER dissector can cause an infinite loop or abortion. CVE-2005-2367 Format string vulnerabilities in the several dissectors allow remote attackers to write to arbitrary memory locations and thus gain privileges. For the old stable distribution (woody) these problems have been fixed in version 0.9.4-1woody13.
Solution
Solution
For the stable distribution (sarge) these problems have been fixed in version 0.10.10-2sarge3. For the unstable distribution (sid) these problems have been fixed in version 0.10.12-2. We recommend that you upgrade your ethereal packages. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20853-1