Debian Security Advisory DSA 853-1 (ethereal)

Summary
The remote host is missing an update to ethereal announced via advisory DSA 853-1. Several security problems have been discovered in ethereal, a commonly used network traffic analyser. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-2360 Memory allocation errors in the LDAP dissector can cause a denial of service. CVE-2005-2361 Various errors in the AgentX, PER, DOCSIS, RADIUS, Telnet, IS-IS, HTTP, DCERPC, DHCP and SCTP dissectors can cause a denial of service. CVE-2005-2363 Various errors in the SMPP, 802.3, H1 and DHCP dissectors can cause a denial of service. CVE-2005-2364 Null pointer dereferences in the WBXML and GIOP dissectors can cause a denial of service. CVE-2005-2365 A buffer overflow and null pointer dereferences in the SMB dissector can cause a denial of service. CVE-2005-2366 Wrong address calculation in the BER dissector can cause an infinite loop or abortion. CVE-2005-2367 Format string vulnerabilities in the several dissectors allow remote attackers to write to arbitrary memory locations and thus gain privileges. For the old stable distribution (woody) these problems have been fixed in version 0.9.4-1woody13.
Solution
For the stable distribution (sarge) these problems have been fixed in version 0.10.10-2sarge3. For the unstable distribution (sid) these problems have been fixed in version 0.10.12-2. We recommend that you upgrade your ethereal packages. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20853-1