ID CVE-2005-2360 Type cve Reporter NVD Modified 2017-10-10T21:30:15
Description
Unknown vulnerability in the LDAP dissector in Ethereal 0.8.5 through 0.10.11 allows remote attackers to cause a denial of service (free static memory and application crash) via unknown attack vectors.
{"osvdb": [{"lastseen": "2017-04-28T13:20:14", "bulletinFamily": "software", "description": "## Vulnerability Description\nEthereal contains an unspecified flaw that may allow a remote denial of service. The issue could be triggered when the LDAP dissector frees static memory and crashes, and will result in loss of availability for the application.\n## Technical Description\nThis issue was discovered by the vendor's testing program. Whether an attacker can exploit this flaw is unknown.\n## Solution Description\nUpgrade to version 0.10.12 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nEthereal contains an unspecified flaw that may allow a remote denial of service. The issue could be triggered when the LDAP dissector frees static memory and crashes, and will result in loss of availability for the application.\n## References:\n[Vendor Specific Advisory URL](http://www.ethereal.com/appnotes/enpa-sa-00020.html)\n[Vendor Specific Advisory URL](http://support.avaya.com/elmodocs2/security/ASA-2005-185.pdf)\n[Vendor Specific Advisory URL](ftp://patches.sgi.com/support/free/security/advisories/20050901-01-U.asc)\nSecurity Tracker: 1014583\n[Secunia Advisory ID:16249](https://secuniaresearch.flexerasoftware.com/advisories/16249/)\n[Secunia Advisory ID:16644](https://secuniaresearch.flexerasoftware.com/advisories/16644/)\n[Secunia Advisory ID:16743](https://secuniaresearch.flexerasoftware.com/advisories/16743/)\n[Secunia Advisory ID:16276](https://secuniaresearch.flexerasoftware.com/advisories/16276/)\n[Secunia Advisory ID:16399](https://secuniaresearch.flexerasoftware.com/advisories/16399/)\n[Secunia Advisory ID:17102](https://secuniaresearch.flexerasoftware.com/advisories/17102/)\n[Secunia Advisory ID:16225](https://secuniaresearch.flexerasoftware.com/advisories/16225/)\n[Secunia Advisory ID:16535](https://secuniaresearch.flexerasoftware.com/advisories/16535/)\nRedHat RHSA: RHSA-2005:687\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200507-27.xml\nOther Advisory URL: http://www.debian.org/security/2005/dsa-853\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_19_sr.html\nKeyword: enpa-sa-00020\nISS X-Force ID: 21568\n[CVE-2005-2360](https://vulners.com/cve/CVE-2005-2360)\nBugtraq ID: 14399\n", "modified": "2005-07-26T05:38:03", "published": "2005-07-26T05:38:03", "href": "https://vulners.com/osvdb/OSVDB:18362", "id": "OSVDB:18362", "type": "osvdb", "title": "Ethereal LDAP Dissector Unspecified Memory Free DoS", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "nessus": [{"lastseen": "2019-01-16T20:06:40", "bulletinFamily": "scanner", "description": "Updated Ethereal packages that fix various security vulnerabilities\nare now available.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe ethereal package is a program for monitoring network traffic.\n\nA number of security flaws have been discovered in Ethereal. On a\nsystem where Ethereal is running, a remote attacker could send\nmalicious packets to trigger these flaws and cause Ethereal to crash\nor potentially execute arbitrary code. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the names\nCVE-2005-2360, CVE-2005-2361, CVE-2005-2362, CVE-2005-2363,\nCVE-2005-2364, CVE-2005-2365, CVE-2005-2366, and CVE-2005-2367 to\nthese issues.\n\nUsers of ethereal should upgrade to these updated packages, which\ncontain version 0.10.12 which is not vulnerable to these issues.\n\nNote: To reduce the risk of future vulnerabilities in Ethereal, the\nethereal and tethereal programs in this update have been compiled as\nPosition Independent Executables (PIE) for Red Hat Enterprise Linux 3\nand 4. In addition FORTIFY_SOURCE has been enabled for Red Hat\nEnterprise Linux 4 packages to provide compile time and runtime buffer\nchecks.", "modified": "2018-11-10T00:00:00", "published": "2006-07-03T00:00:00", "id": "CENTOS_RHSA-2005-687.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21850", "title": "CentOS 3 / 4 : ethereal (CESA-2005:687)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:687 and \n# CentOS Errata and Security Advisory 2005:687 respectively.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21850);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2018/11/10 11:49:27\");\n\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2362\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_bugtraq_id(14399);\n script_xref(name:\"RHSA\", value:\"2005:687\");\n\n script_name(english:\"CentOS 3 / 4 : ethereal (CESA-2005:687)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated Ethereal packages that fix various security vulnerabilities\nare now available.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe ethereal package is a program for monitoring network traffic.\n\nA number of security flaws have been discovered in Ethereal. On a\nsystem where Ethereal is running, a remote attacker could send\nmalicious packets to trigger these flaws and cause Ethereal to crash\nor potentially execute arbitrary code. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the names\nCVE-2005-2360, CVE-2005-2361, CVE-2005-2362, CVE-2005-2363,\nCVE-2005-2364, CVE-2005-2365, CVE-2005-2366, and CVE-2005-2367 to\nthese issues.\n\nUsers of ethereal should upgrade to these updated packages, which\ncontain version 0.10.12 which is not vulnerable to these issues.\n\nNote: To reduce the risk of future vulnerabilities in Ethereal, the\nethereal and tethereal programs in this update have been compiled as\nPosition Independent Executables (PIE) for Red Hat Enterprise Linux 3\nand 4. In addition FORTIFY_SOURCE has been enabled for Red Hat\nEnterprise Linux 4 packages to provide compile time and runtime buffer\nchecks.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012053.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?43f441a1\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012054.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b10bbd55\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012057.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?149086dd\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012058.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6bcbb18c\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012062.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a42071bc\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-August/012063.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5ab090a1\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected ethereal packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ethereal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:ethereal-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/CentOS/release\")) audit(AUDIT_OS_NOT, \"CentOS\");\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"ethereal-0.10.12-1.EL3.1\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"ia64\", reference:\"ethereal-gnome-0.10.12-1.EL3.1\")) flag++;\n\nif (rpm_check(release:\"CentOS-4\", reference:\"ethereal-0.10.12-1.EL4.1\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"ethereal-gnome-0.10.12-1.EL4.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:06:21", "bulletinFamily": "scanner", "description": "Several security problems have been discovered in ethereal, a commonly\nused network traffic analyser. The Common Vulnerabilities and\nExposures project identifies the following problems :\n\n - CAN-2005-2360\n Memory allocation errors in the LDAP dissector can cause\n a denial of service.\n\n - CAN-2005-2361\n\n Various errors in the AgentX, PER, DOCSIS, RADIUS,\n Telnet, IS-IS, HTTP, DCERPC, DHCP and SCTP dissectors\n can cause a denial of service.\n\n - CAN-2005-2363\n\n Various errors in the SMPP, 802.3, H1 and DHCP\n dissectors can cause a denial of service.\n\n - CAN-2005-2364\n\n NULL pointer dereferences in the WBXML and GIOP\n dissectors can cause a denial of service.\n\n - CAN-2005-2365\n\n A buffer overflow and NULL pointer dereferences in the\n SMB dissector can cause a denial of service.\n\n - CAN-2005-2366\n\n Wrong address calculation in the BER dissector can cause\n an infinite loop or abortion.\n\n - CAN-2005-2367\n\n Format string vulnerabilities in several dissectors\n allow remote attackers to write to arbitrary memory\n locations and thus gain privileges.", "modified": "2018-08-09T00:00:00", "published": "2005-10-11T00:00:00", "id": "DEBIAN_DSA-853.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=19961", "title": "Debian DSA-853-1 : ethereal - several vulnerabilities", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-853. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19961);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2018/08/09 17:06:36\");\n\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_xref(name:\"DSA\", value:\"853\");\n\n script_name(english:\"Debian DSA-853-1 : ethereal - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several security problems have been discovered in ethereal, a commonly\nused network traffic analyser. The Common Vulnerabilities and\nExposures project identifies the following problems :\n\n - CAN-2005-2360\n Memory allocation errors in the LDAP dissector can cause\n a denial of service.\n\n - CAN-2005-2361\n\n Various errors in the AgentX, PER, DOCSIS, RADIUS,\n Telnet, IS-IS, HTTP, DCERPC, DHCP and SCTP dissectors\n can cause a denial of service.\n\n - CAN-2005-2363\n\n Various errors in the SMPP, 802.3, H1 and DHCP\n dissectors can cause a denial of service.\n\n - CAN-2005-2364\n\n NULL pointer dereferences in the WBXML and GIOP\n dissectors can cause a denial of service.\n\n - CAN-2005-2365\n\n A buffer overflow and NULL pointer dereferences in the\n SMB dissector can cause a denial of service.\n\n - CAN-2005-2366\n\n Wrong address calculation in the BER dissector can cause\n an infinite loop or abortion.\n\n - CAN-2005-2367\n\n Format string vulnerabilities in several dissectors\n allow remote attackers to write to arbitrary memory\n locations and thus gain privileges.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-853\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the ethereal packages.\n\nFor the old stable distribution (woody) these problems have been fixed\nin version 0.9.4-1woody13.\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 0.10.10-2sarge3.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ethereal\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/10/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/11\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/07/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.0\", prefix:\"ethereal\", reference:\"0.9.4-1woody13\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"ethereal-common\", reference:\"0.9.4-1woody13\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"ethereal-dev\", reference:\"0.9.4-1woody13\")) flag++;\nif (deb_check(release:\"3.0\", prefix:\"tethereal\", reference:\"0.9.4-1woody13\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ethereal\", reference:\"0.10.10-2sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ethereal-common\", reference:\"0.10.10-2sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ethereal-dev\", reference:\"0.10.10-2sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"tethereal\", reference:\"0.10.10-2sarge3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:06:16", "bulletinFamily": "scanner", "description": "Updated Ethereal packages that fix various security vulnerabilities\nare now available.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe ethereal package is a program for monitoring network traffic.\n\nA number of security flaws have been discovered in Ethereal. On a\nsystem where Ethereal is running, a remote attacker could send\nmalicious packets to trigger these flaws and cause Ethereal to crash\nor potentially execute arbitrary code. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the names\nCVE-2005-2360, CVE-2005-2361, CVE-2005-2362, CVE-2005-2363,\nCVE-2005-2364, CVE-2005-2365, CVE-2005-2366, and CVE-2005-2367 to\nthese issues.\n\nUsers of ethereal should upgrade to these updated packages, which\ncontain version 0.10.12 which is not vulnerable to these issues.\n\nNote: To reduce the risk of future vulnerabilities in Ethereal, the\nethereal and tethereal programs in this update have been compiled as\nPosition Independent Executables (PIE) for Red Hat Enterprise Linux 3\nand 4. In addition FORTIFY_SOURCE has been enabled for Red Hat\nEnterprise Linux 4 packages to provide compile time and runtime buffer\nchecks.", "modified": "2018-11-27T00:00:00", "published": "2005-08-12T00:00:00", "id": "REDHAT-RHSA-2005-687.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=19424", "title": "RHEL 2.1 / 3 / 4 : ethereal (RHSA-2005:687)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:687. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19424);\n script_version (\"1.24\");\n script_cvs_date(\"Date: 2018/11/27 13:31:32\");\n\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2362\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_bugtraq_id(14399);\n script_xref(name:\"RHSA\", value:\"2005:687\");\n\n script_name(english:\"RHEL 2.1 / 3 / 4 : ethereal (RHSA-2005:687)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated Ethereal packages that fix various security vulnerabilities\nare now available.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe ethereal package is a program for monitoring network traffic.\n\nA number of security flaws have been discovered in Ethereal. On a\nsystem where Ethereal is running, a remote attacker could send\nmalicious packets to trigger these flaws and cause Ethereal to crash\nor potentially execute arbitrary code. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the names\nCVE-2005-2360, CVE-2005-2361, CVE-2005-2362, CVE-2005-2363,\nCVE-2005-2364, CVE-2005-2365, CVE-2005-2366, and CVE-2005-2367 to\nthese issues.\n\nUsers of ethereal should upgrade to these updated packages, which\ncontain version 0.10.12 which is not vulnerable to these issues.\n\nNote: To reduce the risk of future vulnerabilities in Ethereal, the\nethereal and tethereal programs in this update have been compiled as\nPosition Independent Executables (PIE) for Red Hat Enterprise Linux 3\nand 4. In addition FORTIFY_SOURCE has been enabled for Red Hat\nEnterprise Linux 4 packages to provide compile time and runtime buffer\nchecks.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2360\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2361\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2364\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2365\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2367\"\n );\n # http://www.redhat.com/magazine/009jul05/features/execshield/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/magazine/009jul05/features/execshield/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:687\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected ethereal and / or ethereal-gnome packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ethereal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ethereal-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:2.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/08/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(2\\.1|3|4)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 2.1 / 3.x / 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:687\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"ethereal-0.10.12-1.AS21.1\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"ethereal-gnome-0.10.12-1.AS21.1\")) flag++;\n\n if (rpm_check(release:\"RHEL3\", reference:\"ethereal-0.10.12-1.EL3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"ethereal-gnome-0.10.12-1.EL3.1\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"ethereal-0.10.12-1.EL4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"ethereal-gnome-0.10.12-1.EL4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ethereal / ethereal-gnome\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:06:15", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-200507-27\n(Ethereal: Multiple vulnerabilities)\n\n There are numerous vulnerabilities in versions of Ethereal prior\n to 0.10.12, including:\n The SMB dissector could overflow a\n buffer or exhaust memory (CAN-2005-2365).\n iDEFENSE discovered\n that several dissectors are vulnerable to format string overflows\n (CAN-2005-2367).\n Additionally multiple potential crashes in\n many dissectors have been fixed, see References for further\n details.\nImpact :\n\n An attacker might be able to use these vulnerabilities to crash\n Ethereal or execute arbitrary code with the permissions of the user\n running Ethereal, which could be the root user.\nWorkaround :\n\n There is no known workaround at this time.", "modified": "2018-07-11T00:00:00", "published": "2005-07-31T00:00:00", "id": "GENTOO_GLSA-200507-27.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=19329", "title": "GLSA-200507-27 : Ethereal: Multiple vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200507-27.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19329);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2018/07/11 17:09:25\");\n\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2362\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_bugtraq_id(14399);\n script_xref(name:\"GLSA\", value:\"200507-27\");\n\n script_name(english:\"GLSA-200507-27 : Ethereal: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200507-27\n(Ethereal: Multiple vulnerabilities)\n\n There are numerous vulnerabilities in versions of Ethereal prior\n to 0.10.12, including:\n The SMB dissector could overflow a\n buffer or exhaust memory (CAN-2005-2365).\n iDEFENSE discovered\n that several dissectors are vulnerable to format string overflows\n (CAN-2005-2367).\n Additionally multiple potential crashes in\n many dissectors have been fixed, see References for further\n details.\n \nImpact :\n\n An attacker might be able to use these vulnerabilities to crash\n Ethereal or execute arbitrary code with the permissions of the user\n running Ethereal, which could be the root user.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # http://www.ethereal.com/appnotes/enpa-sa-00020.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://ethereal.archive.sunet.se/appnotes/enpa-sa-00020.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200507-27\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Ethereal users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-analyzer/ethereal-0.10.12'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:ethereal\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/07/31\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/07/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-analyzer/ethereal\", unaffected:make_list(\"ge 0.10.12\"), vulnerable:make_list(\"lt 0.10.12\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Ethereal\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:06:21", "bulletinFamily": "scanner", "description": "A number of vulnerabilities were discovered in versions of Ethereal\nprior to version 0.10.12, including :\n\nThe SMB dissector could overflow a buffer or exhaust memory\n(CVE-2005-2365).\n\niDefense discovered that several dissectors are vulnerable to format\nstring overflows (CVE-2005-2367).\n\nA number of other portential crash issues in various dissectors have\nalso been corrected.\n\nThis update provides Ethereal 0.10.12 which is not vulnerable to these\nissues.", "modified": "2018-12-05T00:00:00", "published": "2005-10-05T00:00:00", "id": "MANDRAKE_MDKSA-2005-131.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=19891", "title": "Mandrake Linux Security Advisory : ethereal (MDKSA-2005:131)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2005:131. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19891);\n script_version (\"1.21\");\n script_cvs_date(\"Date: 2018/12/05 20:31:22\");\n\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2362\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_bugtraq_id(14399);\n script_xref(name:\"MDKSA\", value:\"2005:131\");\n\n script_name(english:\"Mandrake Linux Security Advisory : ethereal (MDKSA-2005:131)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A number of vulnerabilities were discovered in versions of Ethereal\nprior to version 0.10.12, including :\n\nThe SMB dissector could overflow a buffer or exhaust memory\n(CVE-2005-2365).\n\niDefense discovered that several dissectors are vulnerable to format\nstring overflows (CVE-2005-2367).\n\nA number of other portential crash issues in various dissectors have\nalso been corrected.\n\nThis update provides Ethereal 0.10.12 which is not vulnerable to these\nissues.\"\n );\n # http://www.ethereal.com/appnotes/enpa-sa-00020.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://ethereal.archive.sunet.se/appnotes/enpa-sa-00020.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ethereal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ethereal-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ethereal0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libethereal0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:tethereal\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:mandrakesoft:mandrake_linux:le2005\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK10.1\", reference:\"ethereal-0.10.12-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"ethereal-tools-0.10.12-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"x86_64\", reference:\"lib64ethereal0-0.10.12-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"libethereal0-0.10.12-0.1.101mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"tethereal-0.10.12-0.1.101mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK10.2\", reference:\"ethereal-0.10.12-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", reference:\"ethereal-tools-0.10.12-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", cpu:\"x86_64\", reference:\"lib64ethereal0-0.10.12-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", cpu:\"i386\", reference:\"libethereal0-0.10.12-0.1.102mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.2\", reference:\"tethereal-0.10.12-0.1.102mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "centos": [{"lastseen": "2017-10-12T14:44:57", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2005:687\n\n\nThe ethereal package is a program for monitoring network traffic.\r\n\r\nA number of security flaws have been discovered in Ethereal. On a system\r\nwhere Ethereal is running, a remote attacker could send malicious packets\r\nto trigger these flaws and cause Ethereal to crash or potentially execute\r\narbitrary code. The Common Vulnerabilities and Exposures project\r\n(cve.mitre.org) has assigned the names CAN-2005-2360, CAN-2005-2361,\r\nCAN-2005-2362, CAN-2005-2363, CAN-2005-2364, CAN-2005-2365, CAN-2005-2366,\r\nand CAN-2005-2367 to these issues.\r\n\r\nUsers of ethereal should upgrade to these updated packages, which contain\r\nversion 0.10.12 which is not vulnerable to these issues.\r\n\r\nNote: To reduce the risk of future vulnerabilities in Ethereal, the\r\nethereal and tethereal programs in this update have been compiled as\r\nPosition Independant Executables (PIE) for Red Hat Enterprise Linux 3 and\r\n4. In addition FORTIFY_SOURCE has been enabled for Red Hat Enterprise\r\nLinux 4 packages to provide compile time and runtime buffer checks.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012053.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012054.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012057.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012058.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012062.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012063.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012064.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012065.html\n\n**Affected packages:**\nethereal\nethereal-gnome\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-687.html", "modified": "2005-08-11T17:23:51", "published": "2005-08-10T18:37:48", "href": "http://lists.centos.org/pipermail/centos-announce/2005-August/012053.html", "id": "CESA-2005:687", "title": "ethereal security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-10-12T14:47:23", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2005:687-01\n\n\nThe ethereal package is a program for monitoring network traffic.\r\n\r\nA number of security flaws have been discovered in Ethereal. On a system\r\nwhere Ethereal is running, a remote attacker could send malicious packets\r\nto trigger these flaws and cause Ethereal to crash or potentially execute\r\narbitrary code. The Common Vulnerabilities and Exposures project\r\n(cve.mitre.org) has assigned the names CAN-2005-2360, CAN-2005-2361,\r\nCAN-2005-2362, CAN-2005-2363, CAN-2005-2364, CAN-2005-2365, CAN-2005-2366,\r\nand CAN-2005-2367 to these issues.\r\n\r\nUsers of ethereal should upgrade to these updated packages, which contain\r\nversion 0.10.12 which is not vulnerable to these issues.\r\n\r\nNote: To reduce the risk of future vulnerabilities in Ethereal, the\r\nethereal and tethereal programs in this update have been compiled as\r\nPosition Independant Executables (PIE) for Red Hat Enterprise Linux 3 and\r\n4. In addition FORTIFY_SOURCE has been enabled for Red Hat Enterprise\r\nLinux 4 packages to provide compile time and runtime buffer checks.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/012061.html\n\n**Affected packages:**\nethereal\nethereal-gnome\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "modified": "2005-08-10T23:18:03", "published": "2005-08-10T23:18:03", "href": "http://lists.centos.org/pipermail/centos-announce/2005-August/012061.html", "id": "CESA-2005:687-01", "title": "ethereal security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2018-04-06T11:37:54", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n ethereal\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015871 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065256", "id": "OPENVAS:136141256231065256", "type": "openvas", "title": "SLES9: Security update for ethereal", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5015871.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for ethereal\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n ethereal\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015871 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65256\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2362\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"SLES9: Security update for ethereal\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"ethereal\", rpm:\"ethereal~0.10.12~2.2\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:54", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory GLSA 200507-27.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=55003", "id": "OPENVAS:55003", "title": "Gentoo Security Advisory GLSA 200507-27 (Ethereal)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Ethereal is vulnerable to numerous vulnerabilities potentially resulting in\nthe execution of arbitrary code or abnormal termination.\";\ntag_solution = \"All Ethereal users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-analyzer/ethereal-0.10.12'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200507-27\nhttp://bugs.gentoo.org/show_bug.cgi?id=100316\nhttp://www.ethereal.com/appnotes/enpa-sa-00020.html\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200507-27.\";\n\n \n\nif(description)\n{\n script_id(55003);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2362\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200507-27 (Ethereal)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"net-analyzer/ethereal\", unaffected: make_list(\"ge 0.10.12\"), vulnerable: make_list(\"lt 0.10.12\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:59", "bulletinFamily": "scanner", "description": "The remote host is missing an update to ethereal\nannounced via advisory DSA 853-1.\n\nSeveral security problems have been discovered in ethereal, a commonly\nused network traffic analyser. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2005-2360\nMemory allocation errors in the LDAP dissector can cause a denial\nof service.\n\nCVE-2005-2361\nVarious errors in the AgentX, PER, DOCSIS, RADIUS, Telnet, IS-IS,\nHTTP, DCERPC, DHCP and SCTP dissectors can cause a denial of\nservice.\n\nCVE-2005-2363\nVarious errors in the SMPP, 802.3, H1 and DHCP dissectors can\ncause a denial of service.\n\nCVE-2005-2364\nNull pointer dereferences in the WBXML and GIOP dissectors can\ncause a denial of service.\n\nCVE-2005-2365\nA buffer overflow and null pointer dereferences in the SMB\ndissector can cause a denial of service.\n\nCVE-2005-2366\nWrong address calculation in the BER dissector can cause an\ninfinite loop or abortion.\n\nCVE-2005-2367\nFormat string vulnerabilities in the several dissectors allow\nremote attackers to write to arbitrary memory locations and thus\ngain privileges.\n\nFor the old stable distribution (woody) these problems have been fixed in\nversion 0.9.4-1woody13.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=55600", "id": "OPENVAS:55600", "title": "Debian Security Advisory DSA 853-1 (ethereal)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_853_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 853-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 0.10.10-2sarge3.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 0.10.12-2.\n\nWe recommend that you upgrade your ethereal packages.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20853-1\";\ntag_summary = \"The remote host is missing an update to ethereal\nannounced via advisory DSA 853-1.\n\nSeveral security problems have been discovered in ethereal, a commonly\nused network traffic analyser. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2005-2360\nMemory allocation errors in the LDAP dissector can cause a denial\nof service.\n\nCVE-2005-2361\nVarious errors in the AgentX, PER, DOCSIS, RADIUS, Telnet, IS-IS,\nHTTP, DCERPC, DHCP and SCTP dissectors can cause a denial of\nservice.\n\nCVE-2005-2363\nVarious errors in the SMPP, 802.3, H1 and DHCP dissectors can\ncause a denial of service.\n\nCVE-2005-2364\nNull pointer dereferences in the WBXML and GIOP dissectors can\ncause a denial of service.\n\nCVE-2005-2365\nA buffer overflow and null pointer dereferences in the SMB\ndissector can cause a denial of service.\n\nCVE-2005-2366\nWrong address calculation in the BER dissector can cause an\ninfinite loop or abortion.\n\nCVE-2005-2367\nFormat string vulnerabilities in the several dissectors allow\nremote attackers to write to arbitrary memory locations and thus\ngain privileges.\n\nFor the old stable distribution (woody) these problems have been fixed in\nversion 0.9.4-1woody13.\";\n\n\nif(description)\n{\n script_id(55600);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:03:37 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 853-1 (ethereal)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"ethereal\", ver:\"0.9.4-1woody13\", rls:\"DEB3.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ethereal-common\", ver:\"0.9.4-1woody13\", rls:\"DEB3.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ethereal-dev\", ver:\"0.9.4-1woody13\", rls:\"DEB3.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tethereal\", ver:\"0.9.4-1woody13\", rls:\"DEB3.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ethereal\", ver:\"0.10.10-2sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ethereal-common\", ver:\"0.10.10-2sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ethereal-dev\", ver:\"0.10.10-2sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tethereal\", ver:\"0.10.10-2sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-26T08:55:25", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n ethereal\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015871 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=65256", "id": "OPENVAS:65256", "title": "SLES9: Security update for ethereal", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5015871.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for ethereal\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n ethereal\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015871 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65256);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-2360\", \"CVE-2005-2361\", \"CVE-2005-2362\", \"CVE-2005-2363\", \"CVE-2005-2364\", \"CVE-2005-2365\", \"CVE-2005-2366\", \"CVE-2005-2367\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"SLES9: Security update for ethereal\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"ethereal\", rpm:\"ethereal~0.10.12~2.2\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "debian": [{"lastseen": "2018-10-16T22:13:54", "bulletinFamily": "unix", "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 853-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nOctober 9th, 2005 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : ethereal\nVulnerability : several\nProblem-Type : remote\nDebian-specific: no\nCVE ID : CAN-2005-2360 CAN-2005-2361 CAN-2005-2363 CAN-2005-2364 CAN-2005-2365 CAN-2005-2366 CAN-2005-2367\n\nSeveral security problems have been discovered in ethereal, a commonly\nused network traffic analyser. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCAN-2005-2360\n\n Memory allocation errors in the LDAP dissector can cause a denial\n of service.\n\nCAN-2005-2361\n\n Various errors in the AgentX, PER, DOCSIS, RADIUS, Telnet, IS-IS,\n HTTP, DCERPC, DHCP and SCTP dissectors can cause a denial of\n service.\n\nCAN-2005-2363\n\n Various errors in the SMPP, 802.3, H1 and DHCP dissectors can\n cause a denial of service.\n\nCAN-2005-2364\n\n Null pointer dereferences in the WBXML and GIOP dissectors can\n cause a denial of service.\n\nCAN-2005-2365\n\n A buffer overflow and null pointer dereferences in the SMB\n dissector can cause a denial of service.\n\nCAN-2005-2366\n\n Wrong address calculation in the BER dissector can cause an\n infinite loop or abortion.\n\nCAN-2005-2367\n\n Format string vulnerabilities in the several dissectors allow\n remote attackers to write to arbitrary memory locations and thus\n gain privileges.\n\nFor the old stable distribution (woody) these problems have been fixed in\nversion 0.9.4-1woody13.\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 0.10.10-2sarge3.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 0.10.12-2.\n\nWe recommend that you upgrade your ethereal packages.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.0 alias woody\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13.dsc\n Size/MD5 checksum: 681 a14972c16fc38134c821341149b15a5a\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13.diff.gz\n Size/MD5 checksum: 45597 19cab69d49a02ad1edb539b25ea68c75\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4.orig.tar.gz\n Size/MD5 checksum: 3278908 42e999daa659820ee93aaaa39ea1e9ea\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_alpha.deb\n Size/MD5 checksum: 1941188 952157656d9161e6a28ece7c14a2c555\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_alpha.deb\n Size/MD5 checksum: 334858 edcf3011bcb0e54ab74c84dfe19776d7\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_alpha.deb\n Size/MD5 checksum: 223118 e2720177ee4f1211857676fc391d00d3\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_alpha.deb\n Size/MD5 checksum: 1708360 ec7c1f48cdf360bf483d4eeb1860249b\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_arm.deb\n Size/MD5 checksum: 1635932 8910e5fc6cbe7682af2075879b55a858\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_arm.deb\n Size/MD5 checksum: 298468 9e40dcca2b8b00eba260fe94f79d4450\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_arm.deb\n Size/MD5 checksum: 207002 c6d6f567c88253a8740dd99edc668130\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_arm.deb\n Size/MD5 checksum: 1439858 c3bee95dedeca0840c8c7c8a05dbdd68\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_i386.deb\n Size/MD5 checksum: 1513478 87d0692acb79e31d22fc75e793b6e297\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_i386.deb\n Size/MD5 checksum: 287308 f8e2ad89ee905143f6b45c7e882473d3\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_i386.deb\n Size/MD5 checksum: 198964 cc1ba32c0c8b55a82d6f70a2df30050f\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_i386.deb\n Size/MD5 checksum: 1327044 c9085f4a0907ef25ab7bbbcacfdc4ef8\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_ia64.deb\n Size/MD5 checksum: 2150448 f659c70de493fda86b516c26ccbdf4ff\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_ia64.deb\n Size/MD5 checksum: 373822 432a623071185fa13dd7846938624660\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_ia64.deb\n Size/MD5 checksum: 234624 b771c21771b097adb67bc873237240f4\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_ia64.deb\n Size/MD5 checksum: 1861946 1af8550c20f578818fb914b4cdab373b\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_hppa.deb\n Size/MD5 checksum: 1805114 03f0ee1f26bccd8bd06afcbd362e5a16\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_hppa.deb\n Size/MD5 checksum: 323274 81a556881ec81a5454226e3792c9fd5e\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_hppa.deb\n Size/MD5 checksum: 217650 c5d1f9b04ef88c445bf76ea7cb3d39ff\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_hppa.deb\n Size/MD5 checksum: 1576474 7c9f0de387ed98b7f6ad193d1eebd65b\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_m68k.deb\n Size/MD5 checksum: 1424958 29e4fb9bd982b34e3b817b720b504887\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_m68k.deb\n Size/MD5 checksum: 283620 1eafdce67f2caf49eb38f91d8e890b07\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_m68k.deb\n Size/MD5 checksum: 195920 5f31f70f910899e04060dbc51adca631\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_m68k.deb\n Size/MD5 checksum: 1249154 0b22f6dd317393fffcedfc24fd0594fe\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_mips.deb\n Size/MD5 checksum: 1617196 3167d42c291812f12c4a2d9d41ade0b8\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_mips.deb\n Size/MD5 checksum: 306020 23dfd273a4f037d75fe13e6120483ca8\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_mips.deb\n Size/MD5 checksum: 214566 c4a6a6fcababc389fc6e744b9cc6768d\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_mips.deb\n Size/MD5 checksum: 1422232 320baf32c90be1bfcc244ac3b93be25f\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_mipsel.deb\n Size/MD5 checksum: 1598562 4573d8fc4571fed4245acc95ee785872\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_mipsel.deb\n Size/MD5 checksum: 305506 aac45f1ab9667ebca1d4402a20140cd4\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_mipsel.deb\n Size/MD5 checksum: 214188 9ec3e426f078964f19b207f738a2890b\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_mipsel.deb\n Size/MD5 checksum: 1406744 a48af1c598617dba5cca476b332a6065\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_powerpc.deb\n Size/MD5 checksum: 1618594 53a5b20824374a7e5c79208bd296136b\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_powerpc.deb\n Size/MD5 checksum: 302794 20245fb6bb9ea58ec72e02c6fe457bf7\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_powerpc.deb\n Size/MD5 checksum: 209852 f2f9341ded7609237dc942d17b5795a4\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_powerpc.deb\n Size/MD5 checksum: 1419820 31e423ce00a86c7fa42ac44dce2143c6\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_s390.deb\n Size/MD5 checksum: 1574966 2483e8356413e3279a75da2529a55d9e\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_s390.deb\n Size/MD5 checksum: 301568 27bce6f8ddcc5c1717d04ec8de2b8257\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_s390.deb\n Size/MD5 checksum: 204900 1d92ae0a1c815fd2f1b592205a6be472\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_s390.deb\n Size/MD5 checksum: 1387670 18f5e9b5e7aeb368bc0894f29ad0146d\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody13_sparc.deb\n Size/MD5 checksum: 1583740 27c3837c712ec20801296c271f7f5574\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody13_sparc.deb\n Size/MD5 checksum: 318820 f3a07ddbbd077b6d8de40b121f788fb9\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody13_sparc.deb\n Size/MD5 checksum: 205662 9ec1889a5e3f10000ee8eabc9a93342b\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody13_sparc.deb\n Size/MD5 checksum: 1389812 5a4bb26b67f1f8a9e5d1f00ef735d713\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3.dsc\n Size/MD5 checksum: 855 2f3011894f29728f1b4b667418a83b20\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3.diff.gz\n Size/MD5 checksum: 166589 208197070a9bffebf9ca3286ab606e7d\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10.orig.tar.gz\n Size/MD5 checksum: 7411510 e6b74468412c17bb66cd459bfb61471c\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_alpha.deb\n Size/MD5 checksum: 541634 8467337e4b372914419c5f33c4486048\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_alpha.deb\n Size/MD5 checksum: 5474828 5a5ccad452cd5f72005b64a663cbde45\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_alpha.deb\n Size/MD5 checksum: 153736 2022700af3d2f20539be0b53dfd68b3b\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_alpha.deb\n Size/MD5 checksum: 105004 c31e05995f3bf595479489326772b2d4\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_amd64.deb\n Size/MD5 checksum: 485220 e01fe329d0fbc6c2edb85641d583c916\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_amd64.deb\n Size/MD5 checksum: 5333782 b0edc8a4194bcf3e646f98d4e0accce4\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_amd64.deb\n Size/MD5 checksum: 153730 28cb9daf3417180f398b46f9e766071c\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_amd64.deb\n Size/MD5 checksum: 98284 d49a2f3c0d0c60cba44e14f661d24dd4\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_arm.deb\n Size/MD5 checksum: 471584 e86b521d4c73ed25a363155a440ddf72\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_arm.deb\n Size/MD5 checksum: 4686010 8e29ff9d0739550f709ed110e322758a\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_arm.deb\n Size/MD5 checksum: 153750 352080c1f5ae27e3d9a6dfb0f2f3660f\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_arm.deb\n Size/MD5 checksum: 94232 9586fda35f4aeb9f276e6c3ebbe30449\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_i386.deb\n Size/MD5 checksum: 442330 cd7dd7e542d49f2637dc37471dabda3f\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_i386.deb\n Size/MD5 checksum: 4491428 1b421b03dc36bcf24f8dcd6e8ba1d686\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_i386.deb\n Size/MD5 checksum: 153566 0afa50ccbe9ead20dd61bf5942889b68\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_i386.deb\n Size/MD5 checksum: 89728 d6be5e22faa8b2e2ff2ed5e6b217018d\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_ia64.deb\n Size/MD5 checksum: 673324 f6cb0da9666864418db7ca2e19d30891\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_ia64.deb\n Size/MD5 checksum: 6625798 22d82f26a4b9e3125f8fb7150f62c9d6\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_ia64.deb\n Size/MD5 checksum: 153724 6f25d2e866cdc235adb8f76fbb0376b2\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_ia64.deb\n Size/MD5 checksum: 127998 cc1fe884aae15e10fb2c258b9188e877\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_hppa.deb\n Size/MD5 checksum: 488006 f2e4d90a29044fb5fd67e325719b1f15\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_hppa.deb\n Size/MD5 checksum: 5786030 090527370ed04b383a29b326b23b9068\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_hppa.deb\n Size/MD5 checksum: 153766 4ef286e994d17f1913bb38d075422173\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_hppa.deb\n Size/MD5 checksum: 97288 cf6b5f91105e4bdab6b990d3351abf6d\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_m68k.deb\n Size/MD5 checksum: 446618 bdd31e470380ee9678b87a8d9ff983a4\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_m68k.deb\n Size/MD5 checksum: 5563736 6be9de1247286c7b153accfe834fe767\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_m68k.deb\n Size/MD5 checksum: 153800 cd3dbb07333adf5c17772bb7236426b8\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_m68k.deb\n Size/MD5 checksum: 89806 4182783993c017ae07bd86febba3856f\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_mips.deb\n Size/MD5 checksum: 461298 b64d99e8fe40e18fa4b7060e23dc8cd5\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_mips.deb\n Size/MD5 checksum: 4722614 d76d340ebc6c30f442a7bccfd59c2282\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_mips.deb\n Size/MD5 checksum: 153730 99f3ae59636a44dd39085714415b07aa\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_mips.deb\n Size/MD5 checksum: 93490 5b84b97cdca540b72f6c977867f948e4\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_mipsel.deb\n Size/MD5 checksum: 456600 06eeea77def3c5c963321e9c172c1549\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_mipsel.deb\n Size/MD5 checksum: 4458842 5b4bf525350a429124986d896e2c0577\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_mipsel.deb\n Size/MD5 checksum: 153758 b7eb9c0e3fba302bfceb98fdebad2e69\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_mipsel.deb\n Size/MD5 checksum: 93436 a71148d1be63d63bfbad7ddea8987170\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_powerpc.deb\n Size/MD5 checksum: 454474 48e260c08135b4bfaf040332fa6165d6\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_powerpc.deb\n Size/MD5 checksum: 5069306 cada16e51ac36beb419c5a9e5244fc77\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_powerpc.deb\n Size/MD5 checksum: 153766 8ddad2121b0db827060d2886efecbf3d\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_powerpc.deb\n Size/MD5 checksum: 93322 043923838d836bd067659bf7533bc157\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_s390.deb\n Size/MD5 checksum: 478686 c9097866661b177049a51c22878497ad\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_s390.deb\n Size/MD5 checksum: 5620462 e05dcbf9b772756cb6dcffa55ef3da3a\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_s390.deb\n Size/MD5 checksum: 153734 e48d9671680e76186be783ee97228b2e\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_s390.deb\n Size/MD5 checksum: 98812 eddb2492f9e0d9996920c7b81656e986\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge3_sparc.deb\n Size/MD5 checksum: 463952 1ad7f54137bba08dc313ca4c967c0460\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge3_sparc.deb\n Size/MD5 checksum: 5127628 771302e93a266684523a2ea4d01fa949\n http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge3_sparc.deb\n Size/MD5 checksum: 153756 2ef798897bdea7c31ce6ef4c13b6cff3\n http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge3_sparc.deb\n Size/MD5 checksum: 92690 27a7dbe545e8b3a4e6e749963f58ccb5\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "modified": "2005-10-09T00:00:00", "published": "2005-10-09T00:00:00", "id": "DEBIAN:DSA-853-1:C29BB", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00246.html", "title": "[SECURITY] [DSA 853-1] New ethereal packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:06", "bulletinFamily": "unix", "description": "### Background\n\nEthereal is a feature-rich network protocol analyzer. \n\n### Description\n\nThere are numerous vulnerabilities in versions of Ethereal prior to 0.10.12, including: \n\n * The SMB dissector could overflow a buffer or exhaust memory (CAN-2005-2365).\n * iDEFENSE discovered that several dissectors are vulnerable to format string overflows (CAN-2005-2367).\n * Additionally multiple potential crashes in many dissectors have been fixed, see References for further details.\n\n### Impact\n\nAn attacker might be able to use these vulnerabilities to crash Ethereal or execute arbitrary code with the permissions of the user running Ethereal, which could be the root user. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Ethereal users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-analyzer/ethereal-0.10.12\"", "modified": "2005-07-28T00:00:00", "published": "2005-07-28T00:00:00", "id": "GLSA-200507-27", "href": "https://security.gentoo.org/glsa/200507-27", "type": "gentoo", "title": "Ethereal: Multiple vulnerabilities", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "redhat": [{"lastseen": "2018-12-11T17:42:48", "bulletinFamily": "unix", "description": "The ethereal package is a program for monitoring network traffic.\r\n\r\nA number of security flaws have been discovered in Ethereal. On a system\r\nwhere Ethereal is running, a remote attacker could send malicious packets\r\nto trigger these flaws and cause Ethereal to crash or potentially execute\r\narbitrary code. The Common Vulnerabilities and Exposures project\r\n(cve.mitre.org) has assigned the names CAN-2005-2360, CAN-2005-2361,\r\nCAN-2005-2362, CAN-2005-2363, CAN-2005-2364, CAN-2005-2365, CAN-2005-2366,\r\nand CAN-2005-2367 to these issues.\r\n\r\nUsers of ethereal should upgrade to these updated packages, which contain\r\nversion 0.10.12 which is not vulnerable to these issues.\r\n\r\nNote: To reduce the risk of future vulnerabilities in Ethereal, the\r\nethereal and tethereal programs in this update have been compiled as\r\nPosition Independant Executables (PIE) for Red Hat Enterprise Linux 3 and\r\n4. In addition FORTIFY_SOURCE has been enabled for Red Hat Enterprise\r\nLinux 4 packages to provide compile time and runtime buffer checks.", "modified": "2018-05-11T23:27:31", "published": "2005-08-10T04:00:00", "id": "RHSA-2005:687", "href": "https://access.redhat.com/errata/RHSA-2005:687", "type": "redhat", "title": "(RHSA-2005:687) ethereal security update", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}