EtherApe RPC Packet Processing Denial of Service Vulnerability

Summary
This host is installed with EtherApe and is prone to denial of service vulnerabilities.
Impact
Successful exploitation allows remote attackers to cause a NULL pointer dereference or cause a denial of service. Impact Level: Application
Solution
Upgrade to EtherApe version 0.9.12 or later, For updates refer to http://etherape.sourceforge.net/
Insight
The flaw is due to an error in the add_conversation function in 'conversations.c' when processing specially crafted RPC packet.
Affected
EtherApe version prior to 0.9.12
References