Package : ethereal
Problem type : remote exploit
hacksware reported a buffer overflow in the AFS packet parsing code
in ethereal. Gerald Combs then found more overflows in the netbios
and ntp decoding logic as well. An attacker can exploit those
overflows by sending carefully crafted packets to a network that is
being monitored by ethereal.
This has been fixed in version 0.8.0-2potato and we recommend
you upgrade your ethereal package immediately.
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
Potato was released for alpha, arm, i386, m68k, powerpc and
sparc. Packages for m68k are not available at this momemt; when
they become available they will be announced on http://security.debian.org/
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.