Jump to content

Security Advisories (MDKSA-2005:193-1): ethereal


aru
 Share

Recommended Posts

Mandriva Security Advisories MDKSA-2005:193-1 : ethereal

 

Updated ethereal packages fix multiple vulnerabilities

October 26th, 2005

 

Ethereal 0.10.13 is now available fixing a number of security vulnerabilities in various dissectors: - the ISAKMP dissector could exhaust system memory - the FC-FCS dissector could exhaust system memory - the RSVP dissector could exhaust system memory - the ISIS LSP dissector could exhaust system memory - the IrDA dissector could crash - the SLIMP3 dissector could overflow a buffer - the BER dissector was susceptible to an infinite loop - the SCSI dissector could dereference a null pointer and crash - the sFlow dissector could dereference a null pointer and crash - the RTnet dissector could dereference a null pointer and crash - the SigComp UDVM could go into an infinite loop or crash - the X11 dissector could attempt to divide by zero - if SMB transaction payload reassembly is enabled the SMB dissector could crash (by default this is disabled) - if the "Dissect unknown RPC program numbers" option was enabled, the ONC RPC dissector might be able to exhaust system memory (by default this is disabled) - the AgentX dissector could overflow a buffer - the WSP dissector could free an invalid pointer - iDEFENSE discovered a buffer overflow in the SRVLOC dissector The new version of Ethereal is provided and corrects all of these issues.

 

Update:

 

An infinite loop in the IRC dissector was also discovered and fixed after the 0.10.13 release.The updated packages include the fix.

 

 

The released versions of Mandriva GNU/Linux affected are:

  • 10.2
  • 2006.0

Full information about this advisory, including the updated packages, is available at:

www.mandriva.com/security/advisories?name=MDKSA-2005:193-1

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3313

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3184

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3249

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3248

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3247

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3246

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3245

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3244

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3243

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3242

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3241

http://www.ethereal.com/appnotes/enpa-sa-00021.html

 

Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.14 2005/05/15 18:06:11 aru Exp aru $)

Link to comment
Share on other sites

 Share

×
×
  • Create New...