Ethereal: security problems in ethereal 0.9.15
Gentoo Linux Security Advisory
||GLSA 200311-05 / Ethereal
||November 22, 2003
||November 22, 2003: 01
All supported architectures
Ethereal is vulnerable to heap and buffer overflows in the GTP, ISAKMP,
MEGACO, and SOCKS protocol dissectors.
Ethereal is a popular network protocol analyzer.
Ethereal contains buffer overflow vulnerabilities in the GTP, ISAKMP, and
MEGACO protocol dissectors, and a heap overflow vulnerability in the SOCKS
protocol dissector, which could cause Ethereal to crash or to execute
A remote attacker could craft a malformed packet which would cause Ethereal
to crash or run arbitrary code with the permissions of the user running
There is no known workaround at this time, other than to disable the GTP,
ISAKMP, MEGACO, and SOCKS protocol dissectors.
It is recommended that all Gentoo Linux users who are running
net-analyzer/ethereal 0.9.x upgrade:
Code Listing 3.1: Resolution
# emerge sync
# emerge -pv '>=net-analyzer/ethereal-0.9.16'
# emerge '>=net-analyzer/ethereal-0.9.16'
# emerge clean