Intrusion Prevention



This indicates an attack attempt to exploit possible multiple vulnerabilities in Ethereal.
The vulnerability is due to an input validation error in the ISAKMP, FC-FCS, RSVP, ISIS LSP, IrDA, SLIMP3, BER, SCSI, ONC RPC, sFlow, RTnet, SMB, X11, AgentX, WSP, NCP, ACSE and SRVLOC dissectors. In the worse case scenario, a remote attacker may be able to exploit this to execute arbitrary code within the context of the application.

Affected Products

Ethereal Group Ethereal 0.10.12, 0.10.11 and 0.10.10


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Upgrade to the latest version of Ethereal (now known as Wireshark):