Mandrakelinux Advisory: etherealJul 10, 2004, 02:58 (0 Talkback[s])
Mandrakelinux Security Update Advisory
Package name: ethereal
Three vulnerabilities were discovered in Ethereal versions prior to 0.10.5 in the iSNS, SMB SID, and SNMP dissectors. It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet into the wire or by convincing someone to read a malformed packet trace file.
These vulnerabilities have been corrected in Ethereal 0.10.5.
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
If you want to report vulnerabilities, please contact
Type Bits/KeyID Date User ID