Executive Summary
Summary | |
---|---|
Title | New ethereal packages fix buffer overflow |
Informations | |||
---|---|---|---|
Name | DSA-718 | First vendor Publication | 2005-04-28 |
Vendor | Debian | Last vendor Modification | 2005-04-28 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
[ This version lists the correct packages in the packages section. ] A buffer overflow has been detected in the IAPP dissector of Ethereal, a commonly used network traffic analyser. A remote attacker may be able to overflow a buffer using a specially crafted packet. More problems have been discovered which don't apply to the version in woody but are fixed in sid as well. For the stable distribution (woody) this problem has been fixed in version 0.9.4-1woody12. For the unstable distribution (sid) these problems have been fixed in version 0.10.10-1. We recommend that you upgrade your ethereal packages. |
Original Source
Url : http://www.debian.org/security/2005/dsa-718 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:9687 | |||
Oval ID: | oval:org.mitre.oval:def:9687 | ||
Title: | The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions. | ||
Description: | The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-0739 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for ethereal File : nvt/sles9p5016846.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200503-16 (ethereal) File : nvt/glsa_200503_16.nasl |
2008-09-04 | Name : FreeBSD Ports: ethereal, ethereal-lite, tethereal, tethereal-lite File : nvt/freebsd_ethereal.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 718-1 (ethereal) File : nvt/deb_718_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 718-2 (ethereal) File : nvt/deb_718_2.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
14667 | Ethereal IAPP Dissector Remote Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-07-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_cb47036894d211d9a9e00001020eed82.nasl - Type : ACT_GATHER_INFO |
2005-04-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-718.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-306.nasl - Type : ACT_GATHER_INFO |
2005-03-16 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-053.nasl - Type : ACT_GATHER_INFO |
2005-03-14 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200503-16.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:01 |
|