[Ethereal on all distributions is vulnerable to this potential remote vulnerability. Please upgrade if you use Ethereal -- Raju]
This is an RFC 1153 digest. (1 message) ---------------------------------------------------------------------- Message-ID: <[EMAIL PROTECTED]> From: Jonas Eriksson <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Potential issue with Ethereal Date: Fri, 30 Aug 2002 20:30:52 +0200 (CEST) >From the ethereal page, http://www.ethereal.com/appnotes/enpa-sa-00006.html SUMMARY Name: Potential issue with Ethereal 0.9.5 Docid: enpa-sa-00006 Date: August 20, 2002 Severity: High DETAILS Description: The ISIS protocol dissector in Ethereal 0.9.5 and earlier versions is susceptible to a buffer overflow. In order to determine which version of Ethereal you have installed, do one of the following: Load Ethereal and go to the Help->About Ethereal... menu item. >From the command line run ethereal -vor tethereal -v(the "v" is lowercase"). Either action will display the the application version along with the libraries that Ethereal and Tethereal are linked with. If version "0.9.5" or prior is displayed, the application is susceptible. Impact: It may be possible to make Ethereal crash or hang by injecting a purposefully malformed packet onto the wire, or by convincing someone to read a malformed packet trace file. It may be possible to make Ethereal run arbitrary code by exploiting the buffer and pointer problems. Resolution: Upgrade to 0.9.6. If you are running a version prior to 0.9.6, you can disable the ISIS protocol dissector by selecting Edit->Protocols... and deselecting "isis" from the list. Regards, Jonas Eriksson ------------------------------ End of this Digest ****************** -- Raju Mathur [EMAIL PROTECTED] http://kandalaya.org/ It is the mind that moves ================================================ To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject header. Check archives at http://www.mail-archive.com/ilugd%40wpaa.org
