This host is installed with EtherApe and is prone to denial of service vulnerabilities.
Successful exploitation allows remote attackers to cause a NULL pointer dereference or cause a denial of service. Impact Level: Application
Upgrade to EtherApe version 0.9.12 or later, For updates refer to http://etherape.sourceforge.net/
The flaw is due to an error in the add_conversation function in 'conversations.c' when processing specially crafted RPC packet.
EtherApe version prior to 0.9.12
Updated on 2015-03-25