Description: | Description:
The remote host is missing an update to ethereal announced via advisory MDKSA-2004:152.
A number of vulnerabilities were discovered in Ethereal:
- Matthew Bing discovered a bug in DICOM dissection that could make Ethereal crash (CVE-2004-1139) - An invalid RTP timestamp could make Ethereal hang and create a large temporary file, possibly filling available disk space (CVE-2004-1140) - The HTTP dissector could access previously-freed memory, causing a crash (CVE-2004-1141) - Brian Caswell discovered that an improperly formatted SMB packet could make Ethereal hang, maximizing CPU utilization (CVE-2004-1142)
Ethereal 0.10.8 was released to correct these problems and is being provided.
Affected versions: 10.0, 10.1
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2004:152 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1139 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1140 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1141 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1142 http://www.ethereal.com/appnotes/enpa-sa-00016.html
Risk factor : Medium
CVSS Score: 5.0
|