Executive Summary

Summary
Title memory allocation error in ethereal
Informations
Name DSA-130 First vendor Publication 2002-06-01
Vendor Debian Last vendor Modification 2002-06-01
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Ethereal versions prior to 0.9.3 were vulnerable to an allocation error in the ASN.1 parser. This can be triggered when analyzing traffic using the SNMP, LDAP, COPS, or Kerberos protocols in ethereal. This vulnerability was announced in the ethereal security advisory enpa-sa-00003 and has been given the proposed CVE id of CAN-2002-0353. This issue has been corrected in ethereal version 0.8.0-3potato for Debian 2.2 (potato).

Additionally, a number of vulnerabilities were discussed in ethereal security advisory enpa-sa-00004; the version of ethereal in Debian 2.2 (potato) is not vulnerable to the issues raised in this later advisory. Users of the not-yet-released woody distribution should ensure that they are running ethereal 0.9.4-1 or a later version.

We recommend you upgrade your ethereal package immediately.

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato -

Original Source

Url : http://www.debian.org/security/2002/dsa-130

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 4
Os 1

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 130-1 (ethereal)
File : nvt/deb_130_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
6926 Ethereal Kerberos Dissector ASN.1 Parser Overflow DoS

6925 Ethereal COPS Dissector ASN.1 Parser Overflow DoS

6924 Ethereal LDAP Dissector ASN.1 Parser Overflow DoS

4484 Ethereal GIOP Dissector Memory Exhaustion DoS

4483 Ethereal DNS Dissector Malformed Packet Infinite Loop DoS

4482 Ethereal X11 Dissector keysyms Parsing Overflow

4481 Ethereal SMB Dissector NULL Pointer Code Execution

4473 Ethereal SNMP Dissector ASN.1 Parser Overflow DoS

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-130.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2002-170.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:26:39
  • Multiple Updates