Ethereal.Multiple.Protocol.Dissector.DoS
Description
This indicates an attack attempt to exploit a Denial of Service vulnerability in Ethereal/Wireshark.
The vulnerability is due to an input validation error when handling multiple protocol packet, such as WSP, Q.931, H.245, KINK, MGCP, RPC, SMBMailslot, and SMB NETLOGON. A remote attacker may be able to exploit this to cause a denial of service condition on the affected system.
Affected Products
Ethereal Group Ethereal 0.9.9
Ethereal Group Ethereal 0.9.8
Ethereal Group Ethereal 0.9.7
Ethereal Group Ethereal 0.9.6
Ethereal Group Ethereal 0.9.5
Ethereal Group Ethereal 0.9.4
Ethereal Group Ethereal 0.9.3
Ethereal Group Ethereal 0.9.2
Ethereal Group Ethereal 0.9.16
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.9.14
Ethereal Group Ethereal 0.9.13
Ethereal Group Ethereal 0.9.12
Ethereal Group Ethereal 0.9.11
Ethereal Group Ethereal 0.9.10
Ethereal Group Ethereal 0.9.1
Ethereal Group Ethereal 0.9
Ethereal Group Ethereal 0.8.19
Ethereal Group Ethereal 0.8.18
Ethereal Group Ethereal 0.8.15
Ethereal Group Ethereal 0.8.14
Ethereal Group Ethereal 0.10.9
Ethereal Group Ethereal 0.10.8
Ethereal Group Ethereal 0.10.7
Ethereal Group Ethereal 0.10.6
Ethereal Group Ethereal 0.10.5
Ethereal Group Ethereal 0.10.4
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.2
Ethereal Group Ethereal 0.10.11
Ethereal Group Ethereal 0.10.10
Ethereal Group Ethereal 0.10.1
Ethereal Group Ethereal 0.10
Impact
Denial of Service: Remote attackers can crash vulnerable systems.
Recommended Actions
Upgrade to the latest version of Ethereal (now known as Wireshark):
https://www.wireshark.org/download.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |