SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Wireshark Vendors:   Wireshark.org
Ethereal Bugs in Multiple Dissectors Let Remote Users Execute Arbitrary Code or Cause Denial of Service Conditions
SecurityTracker Alert ID:  1015082
SecurityTracker URL:  http://securitytracker.com/id/1015082
CVE Reference:   CVE-2005-3241, CVE-2005-3242, CVE-2005-3243, CVE-2005-3244, CVE-2005-3245, CVE-2005-3246, CVE-2005-3247, CVE-2005-3248, CVE-2005-3249, CVE-2005-3184   (Links to External Site)
Updated:  Oct 26 2005
Original Entry Date:  Oct 19 2005
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.7.7 up to and including 0.10.12
Description:   Several vulnerabilities were reported in Ethereal. A remote user can execute arbitrary code on the target system or cause denial of service conditions on the target system.

A remote user can cause the ISAKMP, FC-FCS, RSVP, and ISIS LSP dissectors to exhaust system memory.

A remote user can cause the IrDA dissector to crash.

A remote user can trigger a buffer overflow in the SLIMP3, AgentX, and SRVLOC dissectors.

A remote user can cause the BER dissector to enter an infinite loop.

A remote user can cause the SigComp UDVM dissector to enter an infinite loop or crash.

A remote user can trigger a null pointer dereference in the SCSI, sFlow, and RTnet dissectors to cause a crash.

A remote user can trigger a divide by zero error in the X11 dissector.

A remote user can cause an invalid pointer to be freed in the WSP dissector.

If the "Dissect unknown RPC program numbers" option is enabled (not the default setting), a remote user may be able to cause the ONC RPC dissector to exhaust system memory.

If SMB transaction payload reassembly is enabled (not the default setting), a remote user can cause the SMB dissector to crash.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause Ethereal to consume excessive memory or crash.

Solution:   The vendor has issued a fixed version (0.10.13), available at:

http://www.ethereal.com/download.html

Red Hat has issued a fix:

https://rhn.redhat.com/errata/RHSA-2005-809.html

Vendor URL:  www.ethereal.com/appnotes/enpa-sa-00021.html (Links to External Site)
Cause:   Boundary error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 26 2005 (Red Hat Issues Fix) Ethereal Bugs in Multiple Dissectors Let Remote Users Execute Arbitrary Code or Cause Denial of Service Conditions
Red Hat has released a fix for Red Hat Enterprise Linux 2.1, 3, and 4.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC