Package: ethereal
Version: 0.10.10-2sarge4
Severity: critical
Tags: security
Justification: privilige elevation via execution of arbitary code from remote 
hosts

>From <http://www.wireshark.org/security/wnpa-sec-2006-01.html>:

Wireshark 0.99.2 fixes the following vulnerabilities:

    * The GSM BSSMAP dissector could crash. Versions affected: 0.10.11. CVE: 
CVE-2006-3627 

Ilja van Sprundel discovered the following vulnerabilities:

    * The ANSI MAP dissector was vulnerable to a format string overflow. 
Versions affected: 0.10.0. CVE: CVE-2006-3628
    * The Checkpoint FW-1 dissector was vulnerable to a format string overflow. 
Versions affected: 0.10.10. CVE: CVE-2006-3628
    * The MQ dissector was vulnerable to a format string overflow. Versions 
affected: 0.10.4. CVE: CVE-2006-3628
    * The XML dissector was vulnerable to a format string overflow. Versions 
affected: 0.10.13. CVE: CVE-2006-3628
    * The MOUNT dissector could attempt to allocate large amounts of memory. 
Versions affected: 0.9.4. CVE: CVE-2006-3629
    * The NCP NMAS and NDPS dissectors were susceptible to off-by-one errors. 
Versions affected: 0.9.7. CVE: CVE-2006-3630
    * The NTP dissector was vulnerable to a format string overflow. Versions 
affected: 0.10.13. CVE: CVE-2006-3628
    * The SSH dissector was vulnerable to an infinite loop. Versions affected: 
0.9.10. CVE: CVE-2006-3631
    * The NFS dissector may have been susceptible to a buffer overflow. 
Versions affected: 0.8.16. CVE: CVE-2006-3632 

Impact
It may be possible to make Ethereal crash, use up available memory, or run 
arbitrary code by
injecting a purposefully malformed packet onto the wire or by convincing 
someone to read a
malformed packet trace file.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-1-k7
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages ethereal depends on:
ii  ethereal-common              0.99.0-1    network traffic analyser (common f
ii  libadns1                     1.1-4       Asynchronous-capable DNS client li
ii  libatk1.0-0                  1.11.4-2    The ATK accessibility toolkit
ii  libc6                        2.3.6-15    GNU C Library: Shared libraries
ii  libcairo2                    1.2.0-3     The Cairo 2D vector graphics libra
ii  libcap1                      1:1.10-14   support for getting/setting POSIX.
ii  libcomerr2                   1.39-1      common error description library
ii  libfontconfig1               2.3.2-7     generic font configuration library
ii  libglib2.0-0                 2.10.2-1    The GLib library of C routines
ii  libgnutls13                  1.4.0-3     the GNU TLS library - runtime libr
ii  libgtk2.0-0                  2.8.18-1    The GTK+ graphical user interface 
ii  libkrb53                     1.4.3-7     MIT Kerberos runtime libraries
ii  libpango1.0-0                1.12.3-1    Layout and rendering of internatio
ii  libpcap0.8                   0.9.4-2     System interface for user-level pa
ii  libpcre3                     6.4-2       Perl 5 Compatible Regular Expressi
ii  libx11-6                     2:1.0.0-7   X11 client-side library
ii  libxcursor1                  1.1.5.2-5   X cursor management library
ii  libxext6                     1:1.0.0-4   X11 miscellaneous extension librar
ii  libxfixes3                   1:3.0.1.2-4 X11 miscellaneous 'fixes' extensio
ii  libxi6                       1:1.0.0-5   X11 Input extension library
ii  libxinerama1                 1:1.0.1-4   X11 Xinerama extension library
ii  libxrandr2                   2:1.1.0.2-4 X11 RandR extension library
ii  libxrender1                  1:0.9.0.2-4 X Rendering Extension client libra
ii  zlib1g                       1:1.2.3-11  compression library - runtime

Versions of packages ethereal recommends:
ii  gksu                          1.9.1-2    graphical frontend to su

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to