Summary
The remote host is missing an update to ethereal
announced via advisory DSA 613-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20613-1
Insight
Brian Caswell discovered that an improperly formatted SMB packet could make ethereal hang and eat CPU endlessly.
For the stable distribution (woody) this problem has been fixed in version 0.9.4-1woody9.
For the unstable distribution (sid) this problem has been fixed in version 0.10.8-1.
We recommend that you upgrade your ethereal packages.
Severity
Classification
-
CVE CVE-2004-1142 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities