Lucene search

K
gentooGentoo FoundationGLSA-200510-25
HistoryOct 30, 2005 - 12:00 a.m.

Ethereal: Multiple vulnerabilities in protocol dissectors

2005-10-3000:00:00
Gentoo Foundation
security.gentoo.org
11

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.125 Low

EPSS

Percentile

95.4%

Background

Ethereal is a feature-rich network protocol analyzer.

Description

There are numerous vulnerabilities in versions of Ethereal prior to 0.10.13, including:

  • The SLIM3 and AgentX dissectors could overflow a buffer (CVE-2005-3243).
  • iDEFENSE discovered a buffer overflow in the SRVLOC dissector (CVE-2005-3184).
  • Multiple potential crashes in many dissectors have been fixed, see References for further details.

Furthermore an infinite loop was discovered in the IRC protocol dissector of the 0.10.13 release (CVE-2005-3313).

Impact

An attacker might be able to use these vulnerabilities to crash Ethereal or execute arbitrary code with the permissions of the user running Ethereal, which could be the root user.

Workaround

There is no known workaround at this time.

Resolution

All Ethereal users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.13-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-analyzer/ethereal< 0.10.13-r1UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.125 Low

EPSS

Percentile

95.4%