Executive Summary
Summary | |
---|---|
Title | Updated Ethereal packages fix security issues |
Informations | |||
---|---|---|---|
Name | RHSA-2004:136 | First vendor Publication | 2004-03-30 |
Vendor | RedHat | Last vendor Modification | 2004-03-30 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2004-136.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-476 | NULL Pointer Dereference |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10013 | |||
Oval ID: | oval:org.mitre.oval:def:10013 | ||
Title: | Unknown vulnerability in Ethereal 0.8.13 to 0.10.2 allows attackers to cause a denial of service (segmentation fault) via a malformed color filter file. | ||
Description: | Unknown vulnerability in Ethereal 0.8.13 to 0.10.2 allows attackers to cause a denial of service (segmentation fault) via a malformed color filter file. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-1761 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:10187 | |||
Oval ID: | oval:org.mitre.oval:def:10187 | ||
Title: | Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. | ||
Description: | Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0176 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:11071 | |||
Oval ID: | oval:org.mitre.oval:def:11071 | ||
Title: | Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. | ||
Description: | Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0367 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:878 | |||
Oval ID: | oval:org.mitre.oval:def:878 | ||
Title: | Multiple BO Vulnerabilities in Red Hat Ethereal | ||
Description: | Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0176 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:879 | |||
Oval ID: | oval:org.mitre.oval:def:879 | ||
Title: | Red Hat Ethereal Denial of Service via Malformed RADIUS Packet | ||
Description: | The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0365 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:880 | |||
Oval ID: | oval:org.mitre.oval:def:880 | ||
Title: | Red Hat Ethereal Denial of Service via 0-Length Presentation Protocol Selector | ||
Description: | Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0367 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:887 | |||
Oval ID: | oval:org.mitre.oval:def:887 | ||
Title: | Multiple BO Vulnerabilities in Red Hat Enterprise 3 Ethereal | ||
Description: | Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0176 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:891 | |||
Oval ID: | oval:org.mitre.oval:def:891 | ||
Title: | Red Hat Enterprise 3 Ethereal Denial of Service via Malformed RADIUS Packet | ||
Description: | The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0365 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:905 | |||
Oval ID: | oval:org.mitre.oval:def:905 | ||
Title: | Red Hat Enterprise 3 Ethereal Denial of Service via 0-Length Presentation Protocol Selector | ||
Description: | Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0367 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9196 | |||
Oval ID: | oval:org.mitre.oval:def:9196 | ||
Title: | The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference. | ||
Description: | The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0365 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200403-07 (ethereal) File : nvt/glsa_200403_07.nasl |
2008-09-04 | Name : FreeBSD Ports: ethereal, tethereal File : nvt/freebsd_ethereal2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 511-1 (ethereal) File : nvt/deb_511_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
13847 | Linux Kernel shmctl() Function Arbitrary Locked Memory Access |
6898 | Ethereal UCP Dissector Handle Time-Field Overflow A remote overflow exists in Ethereal. The UCP Dissector fails to check the boundary of the Time field resulting in a stack overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. This can only be exploited if the system has a MTU bigger than BUFSIZ, which may limit which platforms are susceptable. |
6897 | Ethereal UCP Dissector Handle Int-Field Overflow A remote overflow exists in Ethereal. The UCP Dissector fails to check the boundary of the Integer field resulting in a stack overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. This can only be exploited if the system has a MTU bigger than BUFSIZ, which may limit which platforms are susceptable. |
6896 | Ethereal UCP Dissector Handle String-Field Overflow A remote overflow exists in Ethereal. The UCP Dissector fails to check the boundary of a UCP Packet string resulting in a stack overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. This can only be exploited if the system has a MTU bigger than BUFSIZ, which may limit which platforms are susceptable. |
6895 | Ethereal TCAP Dissector TID Overflow A remote overflow exists in Ethereal. The TCAP Dissector fails to check the bounds of the ASN.1 encoded Transaction ID resulting in a stack overflow. With a specially crafted request, an attacker can execute arbitrary coderesulting in a loss of integrity. |
6894 | Ethereal ISUP Dissector INTERWORKING FUNCTION ADDRESS Overflow A remote overflow exists in Ethereal. The ISUP Dissector fails to check the bounds of the IWFA resulting in a stack overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. |
6893 | Ethereal BGP Dissector MPLS Label Overflow A remote overflow exists in Ethereal. The BGP Dissector fails to check the bounds of the IPv6 label resulting in a stack overflow. With a specially crafted request, an attacker can potentially execute arbitrary code resulting in a loss of integrity. Due to the stacklayout, exploitation would be extremely difficult. |
6892 | Ethereal IRDA Dissector Plugin IRCOM_PORT_NAME Overflow A remote overflow exists in Ethereal. The IRDA Dissector Plugin fails to check the bounds of the "IRCOM_PORT_NAME" variable resulting in an overflow. With a specially crafted request, an attacker can potentially execute arbitrary code resulting in a loss of integrity. Due to the stacklayout, exploitation would be extremely difficult. |
6891 | Ethereal PGM Dissector NakList Overflow A remote overflow exists in Ethereal. The PGM Dissector fails to check the bounds of the Naklist resulting in a integer underflow. With a specially crafted request, an attacker can potentially execute arbitrary code resulting in a loss of integrity. Due to the stacklayout, code execution would be extremely difficult. |
6890 | Ethereal EIGRP Protocol TLV_IP_EXT Long IP Address Overflow A remote overflow exists in Ethereal. The EIGRP Dissector fails to check the bounds of the "TLV_IP_EXT" variable resulting in a stack overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. |
6889 | Ethereal EIGRP Protocol TLV_IP_INT Long IP Address Overflow A remote overflow exists in Ethereal. The EIGRP Dissector fails to check the bounds of the "TLV_IP_INT" variable resulting in a stack overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. |
6888 | Ethereal IGAP Protocol Dissector Message Overflow A remote overflow exists in Ethereal. The IGAP Protocol Dissector fails to check the bounds of the "message" variable resulting in a stack overflow. With a specially crafted request, an attacker can potentially execute arbitrary code resulting in a loss of integrity. |
6887 | Ethereal IGAP Protocol Dissector Account Overflow A remote overflow exists in Ethereal. The IGAP Protocol Dissector fails to check the bounds of the "accountname" variable resulting in a stack overflow. With a specially crafted request, an attacker can potentially execute arbitrary code resulting in a loss of integrity. |
4490 | Ethereal NetFlow v9 Dissector Template Caching Overflow A remote overflow exists in Ethereal. The NetFlow v9 Dissector fails to check the bounds of the template_entry variable resulting in a caching overflow. With a specially crafted request, an attacker can cause a buffer overflow resulting in a loss of integrity. |
4464 | Ethereal Color Filter File DoS Ethereal contains a flaw that may allow a local denial of service. The issue is triggered when creating a malformed color filter file, and will result in loss of availability for the application. No further details have been provided. |
4463 | Ethereal RADIUS Packet DoS Ethereal contains a flaw that may allow a remote denial of service. The issue is triggered due to the 'dissect_attribute_value_pairs' function in packet-radius.c. It is possible for a remote attacker to send a specially crafted RADIUS packet, which triggers a NULL derefence and will result in loss of availability for the application. |
4462 | Ethereal Presentation Protocol Selector DoS Ethereal contains a flaw that may allow a remote denial of service. The issue is triggered by using a zero-length presentation protocol selector, and will result in loss of availability for the application. No further details have been provided. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Ethereal EIGRP prefix length overflow attempt RuleID : 2464-community - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Ethereal EIGRP prefix length overflow attempt RuleID : 2464 - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Ethereal IGMP IGAP message overflow attempt RuleID : 2463-community - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Ethereal IGMP IGAP message overflow attempt RuleID : 2463 - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Ethereal IGMP IGAP account overflow attempt RuleID : 2462-community - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Ethereal IGMP IGAP account overflow attempt RuleID : 2462 - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Ethereal IGAP Dissector Buffer Overflow attempt RuleID : 20747 - Revision : 5 - Type : SERVER-OTHER |
2014-01-10 | Ethereal IGAP Dissector Buffer Overflow attempt RuleID : 20746 - Revision : 5 - Type : SERVER-OTHER |
2014-01-10 | Ethereal Netflow dissector buffer overflow attempt RuleID : 20745 - Revision : 3 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_cdf18ed97f4a11d896450020ed76ef5a.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-82-1.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-511.nasl - Type : ACT_GATHER_INFO |
2004-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200403-07.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2004-024.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-136.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:48:26 |
|