SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Wireshark Vendors:   Wireshark.org
Ethereal Buffer Overflows in NetFlow, EIGRP, BGP, and Other Protocol Dissectors May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1009535
SecurityTracker URL:  http://securitytracker.com/id/1009535
CVE Reference:   CAN-2004-0176, CAN-2004-0367   (Links to External Site)
Updated:  Mar 26 2004
Original Entry Date:  Mar 23 2004
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.8.13 - 0.10.2
Description:   Several vulnerabilities were reported in Ethereal. A remote user can execute arbitrary code on the target system.

The vendor reported that there are multiple vulnerabilities in Etheral, affecting the NetFlow, IGAP, EIGRP, PGM, IrDA, BGP, ISUP, and TCAP protocol dissectors [CVE: CAN-2004-0176]. Stefan Esser is credited with discovering these flaws.

A remote user can send a specially crafted packet to the target system or via a network monitored by the target system to trigger the buffer overflow. A remote user may be able to cause the target service to crash or execute arbitrary code.

It is also reported that a zero-length Presentation protocol selector can cause the target service to crash [CVE: CAN-2004-0367].

Impact:   A remote user can cause Ethereal to crash or execute arbitrary code.
Solution:   The vendor has released a fixed version (0.10.3), available at:

http://www.ethereal.com/download.html

Vendor URL:  www.ethereal.com/appnotes/enpa-sa-00013.html (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 29 2004 (Gentoo Issues Fix) Ethereal Buffer Overflows in NetFlow, EIGRP, BGP, and Other Protocol Dissectors May Let Remote Users Execute Arbitrary Code   (Kurt Lieber <klieber@gentoo.org>)
Gentoo has released a fix.
Apr 1 2004 (Mandrake Issues Fix) Ethereal Buffer Overflows in NetFlow, EIGRP, BGP, and Other Protocol Dissectors May Let Remote Users Execute Arbitrary Code   (Mandrake Linux Security Team <security@linux-mandrake.com>)
Mandrake has released a fix.
Apr 1 2004 (Red Hat Issues Fix for RH Enterprise Linux) Ethereal Buffer Overflows in NetFlow, EIGRP, BGP, and Other Protocol Dissectors May Let Remote Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Enterprise Linux 2.1 and 3.
Apr 1 2004 (Red Hat Issues Fix for RH Linux) Ethereal Buffer Overflows in NetFlow, EIGRP, BGP, and Other Protocol Dissectors May Let Remote Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Linux 9.
Apr 1 2004 (Conectiva Issues Fix) Ethereal Buffer Overflows in NetFlow, EIGRP, BGP, and Other Protocol Dissectors May Let Remote Users Execute Arbitrary Code   (Conectiva Updates <secure@conectiva.com.br>)
Conectiva has released a fix.
May 31 2004 (Debian Issues Fix) Ethereal Buffer Overflows in NetFlow, EIGRP, BGP, and Other Protocol Dissectors May Let Remote Users Execute Arbitrary Code   (Matt Zimmerman <mdz@debian.org>)
Debian has released a fix.
Oct 1 2004 (Fedora Issues Fix for RH Linux) Ethereal Buffer Overflows in NetFlow, EIGRP, BGP, and Other Protocol Dissectors May Let Remote Users Execute Arbitrary Code   (Marc Deslauriers <marcdeslauriers@videotron.ca>)
Fedora has issued a fix for Red Hat Linux 7.3 and 9.



 Source Message Contents

Date:  Tue, 23 Mar 2004 09:54:43 -0500
Subject:  http://www.ethereal.com/appnotes/enpa-sa-00013.html


http://www.ethereal.com/appnotes/enpa-sa-00013.html

 > Name: Multiple security problems in Ethereal 0.10.2

 > Docid: enpa-sa-00013

 > Date: March 22, 2004

 > Versions affected: 0.8.13 up to and including 0.10.2

 > Severity: High

Ethereal reported the following security issues:

1) Stefan Esser discovered thirteen buffer overflows in the following protocol dissectors: 
NetFlow, IGAP, EIGRP, PGM, IrDA, BGP, ISUP, and TCAP.

2) A zero-length Presentation protocol selector could make Ethereal crash.

3) Jonathan Heussser discovered that a carefully-crafted RADIUS packet could cause a crash.

4) A corrupt color filter file could cause a segmentation fault.

A remote user can execute arbitrary code on the target system.

The vendor has released a fixed version (0.10.3), available at:

http://www.ethereal.com/download.html

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC