FreeBSD Ports: ethereal, tethereal

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.ethereal.com/appnotes/enpa-sa-00013.html http://security.e-matters.de/advisories/032004.html http://secunia.com/advisories/11185 http://www.osvdb.org/4462 http://www.osvdb.org/4463 http://www.osvdb.org/4464 http://www.vuxml.org/freebsd/cdf18ed9-7f4a-11d8-9645-0020ed76ef5a.html
Insight
The following packages are affected: ethereal tethereal CVE-2004-0176 Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. CVE-2004-0365 The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference. CVE-2004-0367 Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector.