Nessus Plugin #15244
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[DSA407] DSA-407-1 ethereal
- Family:
- Debian Local Security Checks
- Category:
- infos
- Copyright:
- This script is (C) 2004 Michel Arboi
- Summary:
- DSA-407-1 ethereal
- Version:
- $Revision: 1.4 $
- Cve_id:
- CAN-2003-0925, CAN-2003-0926, CAN-2003-0927, CAN-2003-1012, CAN-2003-1013
- Bugtraq_id:
- 9248, 9249
- Xrefs:
- DSA:407
- Description:
Several vulnerabilities were discovered upstream in ethereal, a
network traffic analyzer. The Common Vulnerabilities and Exposures
project identifies the following problems:
A buffer overflow allows remote attackers to cause a denial of
service and possibly execute arbitrary code via a malformed GTP
MSISDN string.
Via certain malformed ISAKMP or MEGACO packets remote attackers are
able to cause a denial of service (crash).
A heap-based buffer overflow allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via
the SOCKS dissector.
The SMB dissector allows remote attackers to cause a denial of
service via a malformed SMB packet that triggers a segmentation
fault during processing of selected packets.
The Q.931 dissector allows remote attackers to cause a denial of
service (crash) via a malformed Q.931, which triggers a null
dereference.
For the stable distribution (woody) this problem has been fixed in
version 0.9.4-1woody6.
For the unstable distribution (sid) this problem has been fixed in
version 0.10.0-1.
We recommend that you upgrade your ethereal and tethereal packages.
Solution : http://www.debian.org/security/2004/dsa-407
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.