Secunia Security Advisory - A vulnerability has been reported in Ethereal, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
5fcdaf022ec73ac0330696e7bd6ba75d8f038df9441c81ec9d5468200dafac3a
TITLE:
Ethereal GTP Dissector Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA18229
VERIFY ADVISORY:
https://secunia.com/advisories/18229/
CRITICAL:
Not critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Ethereal 0.x
https://secunia.com/product/1228/
DESCRIPTION:
A vulnerability has been reported in Ethereal, which potentially can
be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an infinite loop error in the GTP
protocol dissector. This may be exploited to cause Ethereal to go
into an infinite loop, consuming all CPU resources.
The vulnerability has been reported in versions 0.9.1 through
0.10.13.
SOLUTION:
Update to version 0.10.14.
https://www.ethereal.com/download.html
Note: The OSPF and IRC dissector vulnerabilities are also fixed in
this version.
For more information:
SA17973
SA17370
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
https://www.ethereal.com/appnotes/enpa-sa-00022.html
OTHER REFERENCES:
SA17973:
https://secunia.com/advisories/17973/
SA17370:
https://secunia.com/advisories/17370/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------