From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200503-16.xml | 75 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 75 insertions(+) create mode 100644 metadata/glsa/glsa-200503-16.xml (limited to 'metadata/glsa/glsa-200503-16.xml') diff --git a/metadata/glsa/glsa-200503-16.xml b/metadata/glsa/glsa-200503-16.xml new file mode 100644 index 000000000000..64de0ea27473 --- /dev/null +++ b/metadata/glsa/glsa-200503-16.xml @@ -0,0 +1,75 @@ + + + + Ethereal: Multiple vulnerabilities + + Multiple vulnerabilities exist in Ethereal, which may allow an attacker to + run arbitrary code or crash the program. + + ethereal + 2005-03-12 + 2006-05-22: 03 + 84547 + remote + + + 0.10.10 + 0.10.10 + + + +

+ Ethereal is a feature rich network protocol analyzer. +

+
+ +

+ There are multiple vulnerabilities in versions of Ethereal earlier than + 0.10.10, including: +

+
    +
  • The Etheric, 3GPP2 A11 and IAPP dissectors are vulnerable to buffer + overflows (CAN-2005-0704, CAN-2005-0699 and CAN-2005-0739).
  • +
  • The GPRS-LLC could crash when the "ignore cipher bit" option is + enabled (CAN-2005-0705).
  • +
  • Various vulnerabilities in JXTA and sFlow dissectors.
  • +
+
+ +

+ An attacker might be able to use these vulnerabilities to crash + Ethereal and execute arbitrary code with the permissions of the user + running Ethereal, which could be the root user. +

+
+ +

+ For a temporary workaround you can disable all affected protocol + dissectors. However, it is strongly recommended that you upgrade to the + latest stable version. +

+
+ +

+ All Ethereal users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.10" +
+ + CAN-2005-0699 + CAN-2005-0704 + CAN-2005-0705 + CAN-2005-0739 + CVE-2005-0765 + CVE-2005-0766 + Ethereal enpa-sa-00018 + + + jaervosz + + + lewk + +
-- cgit v1.2.3