CVE-2005-3248
CVSS5.0
发布时间 :2005-10-27 06:02:00
修订时间 :2010-08-21 00:33:26
NMCOP    

[原文]Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (divide-by-zero) via unknown vectors.


[CNNVD]Ethereal服务位置协议处理栈溢出漏洞(CNNVD-200510-223)

        Ethereal是一款非常流行的网络协议分析工具。
        Ethereal 0.10.12 及其早期版本中的X11 解析器攻击者可以通过未知向量引发拒绝服务攻击。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ethereal_group:ethereal:0.10.8
cpe:/a:ethereal_group:ethereal:0.10.9
cpe:/a:ethereal_group:ethereal:0.10.4
cpe:/a:ethereal_group:ethereal:0.10.6
cpe:/a:ethereal_group:ethereal:0.10.5
cpe:/a:ethereal_group:ethereal:0.10.12
cpe:/a:ethereal_group:ethereal:0.10.10
cpe:/a:ethereal_group:ethereal:0.10.11
cpe:/a:ethereal_group:ethereal:0.10.1
cpe:/a:ethereal_group:ethereal:0.10.7
cpe:/a:ethereal_group:ethereal:0.10.3
cpe:/a:ethereal_group:ethereal:0.10.2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11002Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (divide-...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3248
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200510-223
(官方数据源) CNNVD

- 其它链接及资源

http://www.ethereal.com/appnotes/enpa-sa-00021.html
(PATCH)  CONFIRM  http://www.ethereal.com/appnotes/enpa-sa-00021.html
http://www.securityfocus.com/bid/15148
(UNKNOWN)  BID  15148
http://www.redhat.com/support/errata/RHSA-2005-809.html
(UNKNOWN)  REDHAT  RHSA-2005:809
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html
(UNKNOWN)  FEDORA  FLSA-2006:152922
http://www.osvdb.org/20134
(UNKNOWN)  OSVDB  20134
http://www.novell.com/linux/security/advisories/2005_25_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2005:025
http://www.gentoo.org/security/en/glsa/glsa-200510-25.xml
(UNKNOWN)  GENTOO  GLSA-200510-25
http://www.debian.org/security/2006/dsa-1171
(UNKNOWN)  DEBIAN  DSA-1171
http://securitytracker.com/id?1015082
(UNKNOWN)  SECTRACK  1015082
http://secunia.com/advisories/21813
(UNKNOWN)  SECUNIA  21813
http://secunia.com/advisories/17480
(UNKNOWN)  SECUNIA  17480
http://secunia.com/advisories/17392
(UNKNOWN)  SECUNIA  17392
http://secunia.com/advisories/17377
(UNKNOWN)  SECUNIA  17377
http://secunia.com/advisories/17327
(UNKNOWN)  SECUNIA  17327
http://secunia.com/advisories/17286
(UNKNOWN)  SECUNIA  17286
http://secunia.com/advisories/17254
(UNKNOWN)  SECUNIA  17254

- 漏洞信息

Ethereal服务位置协议处理栈溢出漏洞
中危 设计错误
2005-10-27 00:00:00 2005-10-31 00:00:00
远程  
        Ethereal是一款非常流行的网络协议分析工具。
        Ethereal 0.10.12 及其早期版本中的X11 解析器攻击者可以通过未知向量引发拒绝服务攻击。

- 公告与补丁

        暂无数据

- 漏洞信息 (F49829)

Debian Linux Security Advisory 1171-1 (PacketStormID:F49829)
2006-09-08 00:00:00
Debian  debian.org
advisory,remote,arbitrary,vulnerability
linux,debian
CVE-2006-4333,CVE-2005-3241,CVE-2005-3242,CVE-2005-3243,CVE-2005-3244,CVE-2005-3246,CVE-2005-3248
[点击下载]

Debian Security Advisory 1171-1 - Several remote vulnerabilities have been discovered in the Ethereal network scanner, which may lead to the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1171-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
September 7th, 2006                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : ethereal
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-4333 CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3246 CVE-2005-3248
Debian Bug     : 384528 334880

Several remote vulnerabilities have been discovered in the Ethereal network
scanner, which may lead to the execution of arbitrary code. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-4333

    It was discovered that the Q.2391 dissector is vulnerable to denial
    of service caused by memory exhaustion.

CVE-2005-3241

    It was discovered that the FC-FCS, RSVP and ISIS-LSP dissectors are
    vulnerable to denial of service caused by memory exhaustion.

CVE-2005-3242

    It was discovered that the IrDA and SMB dissectors are vulnerable to
    denial of service caused by memory corruption.

CVE-2005-3243

    It was discovered that the SLIMP3 and AgentX dissectors are vulnerable
    to code injection caused by buffer overflows.

CVE-2005-3244

    It was discovered that the BER dissector is vulnerable to denial of
    service caused by an infinite loop.

CVE-2005-3246

    It was discovered that the NCP and RTnet dissectors are vulnerable to
    denial of service caused by a null pointer dereference.

CVE-2005-3248

    It was discovered that the X11 dissector is vulnerable denial of service
    caused by a division through zero.

This update also fixes a 64 bit-specific regression in the ASN.1 decoder, which
has been introduced in a previous DSA.

For the stable distribution (sarge) these problems have been fixed in
version 0.10.10-2sarge8.

For the unstable distribution (sid) these problems have been fixed in
version 0.99.2-5.1 of wireshark, the network sniffer formerly known as
ethereal.

We recommend that you upgrade your ethereal packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8.dsc
    Size/MD5 checksum:      855 159309d848ffa90cb5ae336582a8e7d4
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10.orig.tar.gz
    Size/MD5 checksum:  7411510 e6b74468412c17bb66cd459bfb61471c
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8.diff.gz
    Size/MD5 checksum:   177921 ee1ce43eb48106f1fc0b75bc9ff3c241

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_alpha.deb
    Size/MD5 checksum:  5476146 cf5b01f923e68a3f07d0080ef69f2b57
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_alpha.deb
    Size/MD5 checksum:   154566 615069b5905d6c2aec9a357eb0dd1306
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_alpha.deb
    Size/MD5 checksum:   106250 cfe9461049fc5e1997d68cbd1a6d6b78
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_alpha.deb
    Size/MD5 checksum:   543034 5c9eaadae44224a002902c4196847aa0

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_amd64.deb
    Size/MD5 checksum:   154556 67cfc697c120e54c489e1552b1a58b6e
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_amd64.deb
    Size/MD5 checksum:    99542 09093de7c28ec1741106dac694ffcae3
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_amd64.deb
    Size/MD5 checksum:   486502 addeab1c3d70537c088574f9f68e6e6d
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_amd64.deb
    Size/MD5 checksum:  5334616 1700b3e18c2b45594cbb80ef2ea58019

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_arm.deb
    Size/MD5 checksum:    95616 39dbfe3ac08048f95b19d74c644b780c
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_arm.deb
    Size/MD5 checksum:   154596 209d45b3ebf7ba313bb7db0c00a095bd
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_arm.deb
    Size/MD5 checksum:   472996 5f0d04db811734c1f1c8c814c93ceaaa
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_arm.deb
    Size/MD5 checksum:  4687892 5b2737d93a7e3673630e96744f648b51

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_hppa.deb
    Size/MD5 checksum:  5787290 f36dc8ae6a78acb2d6a8fa71b18af9cc
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_hppa.deb
    Size/MD5 checksum:   154576 5ce456fee2af8fb5b4f19d786166faf6
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_hppa.deb
    Size/MD5 checksum:   489292 71832119d10ab77eb4547840cf7d3504
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_hppa.deb
    Size/MD5 checksum:    98452 94aae2f351900a65edfddcae9e880bf6

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_i386.deb
    Size/MD5 checksum:   443646 f830051bf5920e2999a8ef9bab332ed2
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_i386.deb
    Size/MD5 checksum:  4529156 4f6c8ec5448ea7b6aa826fce639a5781
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_i386.deb
    Size/MD5 checksum:    90878 45f09d9fe820e537fd9e140fbe86de07
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_i386.deb
    Size/MD5 checksum:   154556 a1a78549f0981eb9aa0f77fdd9ce612b

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_ia64.deb
    Size/MD5 checksum:  6630098 82fc3ba6dd822ee192c2050dc6f38dcf
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_ia64.deb
    Size/MD5 checksum:   674420 9b84646b4f81e1c9415656768f6dc687
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_ia64.deb
    Size/MD5 checksum:   129156 c3deca896916d3a3d1c1065f5e2717c8
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_ia64.deb
    Size/MD5 checksum:   154554 e8a6435b4e1287af4ebfe3cb606c74af

m68k architecture (Motorola Mc680x0)

  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_m68k.deb
    Size/MD5 checksum:    90904 ab21fa89ad4a12f8e0c579872a1c07c4
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_m68k.deb
    Size/MD5 checksum:   154614 b384ae036ab5c2b85f62af368b689a04
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_m68k.deb
    Size/MD5 checksum:   447752 6a8378ecb8337071ef8b1199529700be
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_m68k.deb
    Size/MD5 checksum:  5565186 647220c660fd8546c9ca4a18e9d7a792

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_mips.deb
    Size/MD5 checksum:   154572 434928f40a6b3e4bf2d7dce6beb72edb
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_mips.deb
    Size/MD5 checksum:    94736 4eb62077c31de2ac2ec10a760199b9eb
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_mips.deb
    Size/MD5 checksum:  4723218 9c827aab812bef7a58d5429ee8287d74
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_mips.deb
    Size/MD5 checksum:   462746 fa7d8236f1407836dcc601317afa8df2

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_mipsel.deb
    Size/MD5 checksum:    94650 7f64290882d7c8c579818fdc1c7e215b
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_mipsel.deb
    Size/MD5 checksum:   154584 934dc675944e857216c72fc29ec46a55
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_mipsel.deb
    Size/MD5 checksum:   458030 487ea6f3a1fd7620b4ae33f4d5e8c8c3
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_mipsel.deb
    Size/MD5 checksum:  4460700 e0062d687a84b9782e645b0d72cbb248

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_powerpc.deb
    Size/MD5 checksum:   455716 a203882270b251513b2269b688d59256
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_powerpc.deb
    Size/MD5 checksum:  5068470 7976f110d32b6bb83c00afa49fd75493
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_powerpc.deb
    Size/MD5 checksum:   154570 7622c3b6ca781d622cb305e9a485f447
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_powerpc.deb
    Size/MD5 checksum:    94320 5e5391b1f1dc2bc4992582930e28f2a3

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_s390.deb
    Size/MD5 checksum:  5621642 092cf076ce4e6fd479ea09fdb14d6e87
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_s390.deb
    Size/MD5 checksum:   154566 f3dae98783c87fb3ff088be62608aef7
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_s390.deb
    Size/MD5 checksum:   479662 e4b854e30aa801eb67a33d1077eb1e9b
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_s390.deb
    Size/MD5 checksum:    99904 0516f4694b47ae4637b09e82d321eecc

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge8_sparc.deb
    Size/MD5 checksum:  5130234 44a97eeb06a2d82bbbcfba2712700792
  http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge8_sparc.deb
    Size/MD5 checksum:    93828 4f44e9be92792058641044db66993758
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge8_sparc.deb
    Size/MD5 checksum:   465390 42670783f2750c3d5f426fe76bd17696
  http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge8_sparc.deb
    Size/MD5 checksum:   154566 6f25990f50443c48e802e29881ddc3ff


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>










-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFAI/1Xm3vHE4uyloRAmMLAJ96mXoCRjsSbwl6rxDj27i/5ud5FACghriv
ZiK3sztGjf0cJL4008cQZ5o=
=mfe3
-----END PGP SIGNATURE-----

    

- 漏洞信息

20134
Ethereal X11 Dissector Divide by Zero DoS
Remote / Network Access Denial of Service
Loss of Availability

- 漏洞描述

Ethereal contains a flaw related to the X11 dissector that results in a divide by zero error, which may allow a remote attacker to cause a denial of service. No further details have been provided.

- 时间线

2005-10-19 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.10.13 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站