CVE-2005-0006
CVSS5.0
发布时间 :2005-05-02 00:00:00
修订时间 :2010-08-21 00:25:20
NMCOPS    

[原文]The COPS dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (infinite loop).


[CNNVD]多个Ethereal未明分析器漏洞(CNNVD-200505-295)

        Ethereal 0.10.6至0.10.8中的COPS分析器,远程攻击者可以发起拒绝服务攻击(无限循环)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ethereal_group:ethereal:0.10.8
cpe:/a:ethereal_group:ethereal:0.10.6
cpe:/a:ethereal_group:ethereal:0.10.7

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10801Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0006
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0006
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-295
(官方数据源) CNNVD

- 其它链接及资源

http://www.ethereal.com/appnotes/enpa-sa-00017.html
(PATCH)  CONFIRM  http://www.ethereal.com/appnotes/enpa-sa-00017.html
http://secunia.com/advisories/13946/
(VENDOR_ADVISORY)  SECUNIA  13946
http://xforce.iss.net/xforce/xfdb/18999
(VENDOR_ADVISORY)  XF  ethereal-cops-dos(18999)
http://www.redhat.com/support/errata/RHSA-2005-037.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:037
http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200501-27
http://www.ciac.org/ciac/bulletins/p-106.shtml
(VENDOR_ADVISORY)  CIAC  P-106
http://www.securityfocus.com/bid/12326
(UNKNOWN)  BID  12326
http://www.redhat.com/support/errata/RHSA-2005-011.html
(UNKNOWN)  REDHAT  RHSA-2005:011
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html
(UNKNOWN)  FEDORA  FLSA-2006:152922
http://www.mandriva.com/security/advisories?name=MDKSA-2005:013
(UNKNOWN)  MANDRAKE  MDKSA-2005:013

- 漏洞信息

多个Ethereal未明分析器漏洞
中危 资料不足
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        Ethereal 0.10.6至0.10.8中的COPS分析器,远程攻击者可以发起拒绝服务攻击(无限循环)。

- 公告与补丁

        暂无数据

- 漏洞信息 (F35836)

ethereal-0.10.9.tar.gz (PacketStormID:F35836)
2005-01-22 00:00:00
Gerald Combs  ethereal.com
tool,sniffer,protocol
unix
CVE-2005-0006,CVE-2005-0007,CVE-2005-0008,CVE-2005-0009,CVE-2005-0010,CVE-2005-0084
[点击下载]

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

- 漏洞信息

13108
Ethereal COPS Dissector Infinite Loop DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown Vendor Verified

- 漏洞描述

Ethereal contains a flaw related to the COPS dissector that may allow an attacker to cause the application to enter an infinite loop, and cause a denial of service. No further details have been provided.

- 时间线

2005-01-20 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.10.9 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Multiple Ethereal Unspecified Dissector Vulnerabilities
Unknown 12326
Yes No
2005-01-21 12:00:00 2006-07-31 11:16:00
These issues were announced by the vendor.

- 受影响的程序版本

SGI ProPack 3.0
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux 8.1
S.u.S.E. Linux 8.0 i386
S.u.S.E. Linux 8.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
Gentoo Linux 1.4 _rc3
Gentoo Linux 1.4 _rc2
Gentoo Linux 1.4 _rc1
Gentoo Linux 1.4
Gentoo Linux 1.2
Gentoo Linux 1.1 a
Gentoo Linux 0.7
Gentoo Linux 0.5
Gentoo Linux
Ethereal Group Ethereal 0.10.8
Ethereal Group Ethereal 0.10.7
Ethereal Group Ethereal 0.10.6
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
Ethereal Group Ethereal 0.10.5
Ethereal Group Ethereal 0.10.4
Ethereal Group Ethereal 0.10.3
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ Red Hat Fedora Core2
+ Red Hat Fedora Core1
+ S.u.S.E. Linux Personal 9.2
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.0
Ethereal Group Ethereal 0.10.2
Ethereal Group Ethereal 0.10.1
Ethereal Group Ethereal 0.10
Ethereal Group Ethereal 0.9.16
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.9.14
Ethereal Group Ethereal 0.9.13
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Red Hat Fedora Core1
Ethereal Group Ethereal 0.9.12
Ethereal Group Ethereal 0.9.11
Ethereal Group Ethereal 0.9.10
+ Conectiva Linux 9.0
Ethereal Group Ethereal 0.9.9
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
Ethereal Group Ethereal 0.9.8
+ RedHat Linux 9.0 i386
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2
+ Terra Soft Solutions Yellow Dog Linux 3.0
Ethereal Group Ethereal 0.9.7
Ethereal Group Ethereal 0.9.6
+ Conectiva Linux Enterprise Edition 1.0
Ethereal Group Ethereal 0.9.5
Ethereal Group Ethereal 0.9.4
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
Ethereal Group Ethereal 0.9.3
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
Ethereal Group Ethereal 0.9.2
Ethereal Group Ethereal 0.9.1
- Compaq Tru64 5.0
- Debian Linux 2.2 sparc
- Debian Linux 2.2 powerpc
- Debian Linux 2.2 IA-32
- Debian Linux 2.2 arm
- Debian Linux 2.2 alpha
- Debian Linux 2.2 68k
- HP HP-UX 11.0
- IBM AIX 5.1
- Linux kernel 2.4
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0
- NetBSD NetBSD 1.5
- OpenBSD OpenSSH 3.0
- SCO Unixware 7.0
- SGI IRIX 6.0
- Sun Solaris 8_sparc
Ethereal Group Ethereal 0.9
Ethereal Group Ethereal 0.8.19
Ethereal Group Ethereal 0.8.18
- RedHat Linux 7.2 ia64
- RedHat Linux 7.2 i386
- RedHat Linux 7.2
Ethereal Group Ethereal 0.8.15
Ethereal Group Ethereal 0.8.14
Ethereal Group Ethereal 0.8.13
Ethereal Group Ethereal 0.8
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 IA-32
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
Conectiva Linux 10.0
Conectiva Linux 9.0
ALT Linux ALT Linux Junior 2.3
ALT Linux ALT Linux Compact 2.3

- 漏洞讨论

Ethereal is prone to multiple vulnerabilities ranging from denial of service to arbitrary code execution:

- The COPS dissector may go into an infinite loop.
- The DLSw dissector may force Ethereal to exit prematurely.
- The DNP dissector may corrupt memory.
- The Gnutella dissector may force Ethereal to exit prematurely.
- The MMSE dissector may free statically allocated memory.
- A buffer overflow may occur in the X11 dissector.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Conectiva has released an advisory (CLA-2005:942) along with fixes dealing with these issues. Please see the referenced advisory for more information.

SGI has released advisory 20050202-01-U (SGI Advanced Linux Environment 3 Security Update #26) to address various issues in SGI Advanced Linux Environment 3. This advisory includes updated SGI ProPack 3 Service Pack 3 packages and patch 10141. Please see the referenced advisory for more information.

Debian has released an advisory (DSA 653-1) and fixes to address these issues. Please see the referenced advisory for information on obtaining fixes.

Gentoo has released an advisory (GLSA 200501-27) and fixes to address these issues. To obtain fixes, execute the following commands:
emerge --sync
emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.9"

Mandrake has released MDKSA-2005:013 to address these issues. Please see the referenced advisory for more information.

Fedora has released advisories FEDORA-2005-068 and FEDORA-2005-069 to address these issues. See the referenced advisories for information on obtaining fixes.

Red Hat has released advisory RHSA-2005:011-11 and fixes to address this issue on Red Hat Linux Enterprise platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.

SuSE Linux has released a security summary report (SUSE-SR:2005:003) that contains fixes to address this and other vulnerabilities. Customers are advised to peruse the referenced advisory for further information regarding obtaining and applying appropriate updates.

ALT Linux has released updates dealing with this and other issues. Please see the reference section for more information.

Fedora Legacy has released security advisory FLSA:152922 addressing this and other issues. Please see the referenced advisory for further information.


Ethereal Group Ethereal 0.10

Ethereal Group Ethereal 0.10.1

Ethereal Group Ethereal 0.10.2

Ethereal Group Ethereal 0.10.3

Ethereal Group Ethereal 0.10.4

Ethereal Group Ethereal 0.10.5

Ethereal Group Ethereal 0.10.6

Ethereal Group Ethereal 0.10.7

Ethereal Group Ethereal 0.10.8

Ethereal Group Ethereal 0.8

Ethereal Group Ethereal 0.8.13

Ethereal Group Ethereal 0.8.14

Ethereal Group Ethereal 0.8.15

Ethereal Group Ethereal 0.8.18

Ethereal Group Ethereal 0.8.19

Ethereal Group Ethereal 0.9

Ethereal Group Ethereal 0.9.1

Ethereal Group Ethereal 0.9.10

Ethereal Group Ethereal 0.9.11

Ethereal Group Ethereal 0.9.12

Ethereal Group Ethereal 0.9.13

Ethereal Group Ethereal 0.9.14

Ethereal Group Ethereal 0.9.15

Ethereal Group Ethereal 0.9.16

Ethereal Group Ethereal 0.9.2

Ethereal Group Ethereal 0.9.3

Ethereal Group Ethereal 0.9.4

Ethereal Group Ethereal 0.9.5

Ethereal Group Ethereal 0.9.6

Ethereal Group Ethereal 0.9.7

Ethereal Group Ethereal 0.9.8

Ethereal Group Ethereal 0.9.9

SGI ProPack 3.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站