Executive Summary
Summary | |
---|---|
Title | wireshark security update (was ethereal) |
Informations | |||
---|---|---|---|
Name | RHSA-2006:0602 | First vendor Publication | 2006-08-16 |
Vendor | RedHat | Last vendor Modification | 2006-08-16 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: New Wireshark packages that fix various security vulnerabilities in Ethereal are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Ethereal is a program for monitoring network traffic. In May 2006, Ethereal changed its name to Wireshark. This update deprecates the Ethereal packages in Red Hat Enterprise Linux 2.1, 3, and 4 in favor of the supported Wireshark packages. Several denial of service bugs were found in Ethereal's protocol dissectors. It was possible for Ethereal to crash or stop responding if it read a malformed packet off the network. (CVE-2006-3627, CVE-2006-3629, CVE-2006-3631) Several buffer overflow bugs were found in Ethereal's ANSI MAP, NCP NMAS, and NDPStelnet dissectors. It was possible for Ethereal to crash or execute arbitrary code if it read a malformed packet off the network. (CVE-2006-3630, CVE-2006-3632) Several format string bugs were found in Ethereal's Checkpoint FW-1, MQ, XML, and NTP dissectors. It was possible for Ethereal to crash or execute arbitrary code if it read a malformed packet off the network. (CVE-2006-3628) Users of Ethereal should upgrade to these updated packages containing Wireshark version 0.99.2, which is not vulnerable to these issues 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 199231 - Replace (EOL) Ethereal with Wireshark 199232 - CVE-2006-3627 Mulitple security issues (CVE-2006-3628 CVE-2006-3629 CVE-2006-3630 CVE-2006-3631 CVE-2006-3632) |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2006-0602.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-399 | Resource Management Errors |
20 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
20 % | CWE-134 | Uncontrolled Format String (CWE/SANS Top 25) |
20 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10492 | |||
Oval ID: | oval:org.mitre.oval:def:10492 | ||
Title: | Unspecified vulnerability in the MOUNT dissector in Wireshark (aka Ethereal) 0.9.4 to 0.99.0 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors. | ||
Description: | Unspecified vulnerability in the MOUNT dissector in Wireshark (aka Ethereal) 0.9.4 to 0.99.0 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3629 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11307 | |||
Oval ID: | oval:org.mitre.oval:def:11307 | ||
Title: | Unspecified vulnerability in the GSM BSSMAP dissector in Wireshark (aka Ethereal) 0.10.11 to 0.99.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors. | ||
Description: | Unspecified vulnerability in the GSM BSSMAP dissector in Wireshark (aka Ethereal) 0.10.11 to 0.99.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3627 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11350 | |||
Oval ID: | oval:org.mitre.oval:def:11350 | ||
Title: | Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors. | ||
Description: | Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3630 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11476 | |||
Oval ID: | oval:org.mitre.oval:def:11476 | ||
Title: | Unspecified vulnerability in the SSH dissector in Wireshark (aka Ethereal) 0.9.10 to 0.99.0 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors. | ||
Description: | Unspecified vulnerability in the SSH dissector in Wireshark (aka Ethereal) 0.9.10 to 0.99.0 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3631 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9175 | |||
Oval ID: | oval:org.mitre.oval:def:9175 | ||
Title: | Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. | ||
Description: | Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3628 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9468 | |||
Oval ID: | oval:org.mitre.oval:def:9468 | ||
Title: | Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector. | ||
Description: | Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3632 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for ethereal File : nvt/sles9p5013177.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200607-09 (wireshark ethereal) File : nvt/glsa_200607_09.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1127-1 (ethereal) File : nvt/deb_1127_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
27371 | Wireshark NFS Dissector Unspecified Remote Overflow A remote overflow exists in the Wireshark NFS dissector. The dissector fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted packet, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
27370 | Wireshark SSH Dissector Infinite Loop DoS The Wireshark SSH dissector contains a flaw that may allow a remote denial of service. The issue is triggered by a malformed packet or trace file, and will result in loss of availability for the application. |
27369 | Wireshark NTP Dissector Format String Flaw A format string flaw exists in the Wireshark NTP dissector. With a specially crafted packet, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
27368 | Wireshark NDPS Dissector Unspecified Off-by-one A remote overflow exists in the Wireshark NDPS dissector. The application fails to properly iterate over a buffer resulting in a off-by-one overflow. With a specially crafted packet, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
27367 | Wireshark NMAS Dissector Unspecified Off-by-one A remote overflow exists in the Wireshark NMAS dissector. The application fails to properly iterate over a buffer resulting in a off-by-one overflow. With a specially crafted packet, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
27366 | Wireshark NCP Dissector Unspecified Off-by-one A remote overflow exists in the Wireshark NCP dissector. The application fails to properly iterate over a buffer resulting in a off-by-one overflow. With a specially crafted packet, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
27365 | Wireshark MOUNT Dissector Memory Exhaustion DoS The Wireshark MOUNT dissector contains a flaw that may allow a remote denial of service. The issue is triggered by a malformed packet or trace file, and will result in loss of availability for the application. |
27364 | Wireshark XML Dissector Format String Flaw A format string flaw exists in the Wireshark XML dissector. With a specially crafted packet, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
27363 | Wireshark MQ Dissector Format String Flaw A format string flaw exists in the Wireshark MQ dissector. With a specially crafted packet, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
27362 | Wireshark Checkpoint FW-1 Dissector Format String Flaw A format string flaw exists in the Wireshark Checkpoint FW-1 dissector. With a specially crafted packet, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
27361 | Wireshark ANSI MAP Dissector Format String Overflow A remote overflow exists in the Wireshark ANSI MAP dissector. The protocol dissector fails to sanitize user input resulting in a format string overflow. With a specially crafted packet or trace file, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
27360 | Wireshark GSM BSSMAP Dissector Unspecified DoS The Wireshark GSM BSSMAP dissector contains a flaw that may allow a remote denial of service. The issue is triggered when by a malformed packet or trace file, and will result in loss of availability for the application. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2006-0726.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_ethereal-1930.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_ethereal-1932.nasl - Type : ACT_GATHER_INFO |
2007-01-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-860.nasl - Type : ACT_GATHER_INFO |
2006-12-16 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-128.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1127.nasl - Type : ACT_GATHER_INFO |
2006-08-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2006-0602.nasl - Type : ACT_GATHER_INFO |
2006-08-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0602.nasl - Type : ACT_GATHER_INFO |
2006-07-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200607-09.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:50:08 |
|