TITLE: Ethereal Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA13468
VERIFY ADVISORY: http://secunia.com/advisories/13468/
CRITICAL: Highly critical
IMPACT: DoS, System access
WHERE: >From remote
SOFTWARE: Ethereal 0.x http://secunia.com/product/1228/
DESCRIPTION: Multiple vulnerabilities have been reported in Ethereal, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
1) An unspecified error within the DICOM dissector can be exploited to crash Ethereal.
The vulnerability affects versions 0.10.4 through 0.10.7.
2) An unspecified error within the handling of RTP timestamps can be exploited to cause Ethereal to stop responding and create a large temporary file, which may consume all available disk space.
The vulnerability affects versions 0.9.16 through 0.10.7.
3) An unspecified error within the HTTP dissector may result in freed memory being accessed, which causes Ethereal to crash.
The vulnerability affects versions 0.10.1 through 0.10.7.
4) An unspecified error within the SMB dissector can be exploited via a specially crafted SMB packet to cause Ethereal to stop responding and consume a large amount of CPU resources.
The vulnerability affects versions 0.9.0 through 0.10.7.
NOTE: According to the vendor's advisory, some of the vulnerabilities may also possibly be exploited to execute arbitrary code.
SOLUTION: Update to version 0.10.8. http://www.ethereal.com/download.html
PROVIDED AND/OR DISCOVERED BY: 1) Matthew Bing 2) Reported by vendor. 3) Reported by vendor. 4) Brian Caswell
ORIGINAL ADVISORY: http://www.ethereal.com/appnotes/enpa-sa-00016.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.