CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
90.3%
The remote host is affected by the vulnerability described in GLSA-200407-08 (Ethereal: Multiple security problems)
There are multiple vulnerabilities in versions of Ethereal earlier than 0.10.5, including:
In some cases the iSNS dissector could cause Ethereal to abort.
If there was no policy name for a handle for SMB SID snooping it could cause a crash.
A malformed or missing community string could cause the SNMP dissector to crash.
Impact :
An attacker could use these vulnerabilities to crash Ethereal or even execute arbitrary code with the permissions of the user running Ethereal, which could be the root user.
Workaround :
For a temporary workaround you can disable all affected protocol dissectors by selecting Analyze->Enabled Protocols... and deselecting them from the list. For SMB you can disable SID snooping in the SMB protocol preference. However, it is strongly recommended to upgrade to the latest stable version.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200407-08.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(14541);
script_version("1.17");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2004-0633", "CVE-2004-0634", "CVE-2004-0635");
script_xref(name:"GLSA", value:"200407-08");
script_name(english:"GLSA-200407-08 : Ethereal: Multiple security problems");
script_summary(english:"Checks for updated package(s) in /var/db/pkg");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Gentoo host is missing one or more security-related
patches."
);
script_set_attribute(
attribute:"description",
value:
"The remote host is affected by the vulnerability described in GLSA-200407-08
(Ethereal: Multiple security problems)
There are multiple vulnerabilities in versions of Ethereal earlier than
0.10.5, including:
In some cases the iSNS dissector could cause Ethereal to
abort.
If there was no policy name for a handle for SMB SID snooping it
could cause a crash.
A malformed or missing community string could cause the SNMP
dissector to crash.
Impact :
An attacker could use these vulnerabilities to crash Ethereal or even
execute arbitrary code with the permissions of the user running
Ethereal, which could be the root user.
Workaround :
For a temporary workaround you can disable all affected protocol
dissectors by selecting Analyze->Enabled Protocols... and deselecting
them from the list. For SMB you can disable SID snooping in the SMB
protocol preference. However, it is strongly recommended to upgrade to
the latest stable version."
);
# http://www.ethereal.com/appnotes/enpa-sa-00015.html
script_set_attribute(
attribute:"see_also",
value:"http://ethereal.archive.sunet.se/appnotes/enpa-sa-00015.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://security.gentoo.org/glsa/200407-08"
);
script_set_attribute(
attribute:"solution",
value:
"All Ethereal users should upgrade to the latest stable version:
# emerge sync
# emerge -pv '>=net-analyzer/ethereal-0.10.5'
# emerge '>=net-analyzer/ethereal-0.10.5'"
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:ethereal");
script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
script_set_attribute(attribute:"patch_publication_date", value:"2004/07/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2004/08/30");
script_set_attribute(attribute:"vuln_publication_date", value:"2004/07/06");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
script_family(english:"Gentoo Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (qpkg_check(package:"net-analyzer/ethereal", unaffected:make_list("ge 0.10.5"), vulnerable:make_list("le 0.10.4"))) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = qpkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Ethereal");
}