Ethereal security update (RHSA-2006-0156)

Original Release Date: February 13, 2006
Last Revised: February 22, 2008
Number: ASA-2006-046
Risk Level: Low
Advisory Version: 3.0
Advisory Status: Final

1. Overview:

Ethereal (tethereal) is a program for monitoring network traffic.

Multiple vulnerabilities have been reported in Ethereal. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash or execute arbitrary code. Certain Avaya products ship with Ethereal (tethereal) installed, for debugging purposes, and therefore are affected by some of these vulnerabilities. In order for an attacker to exploit these vulnerabilities, an authenticated local system user would first have to manually start the Ethereal (tethereal) application. Ethereal(tethereal) access is restricted to Avaya Service personnel only, in Avaya system products. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the names CVE-2005-3313, CVE-2005-4585, and CVE-2005-3651 to these issues.

More information about these vulnerabilities can be found in the security advisory issued by Red Hat:

2. Avaya System Products with Ethereal (tethereal) installed:

Product: Affected Version(s): Risk Level: Actions:
Avaya Communication Manager CM 2.x and 3.x Low Upgrade to CM 3.1.4 or later to resolve issue.
Avaya SIP Enablement Services All Low Upgrade to SES 5.0 to resolve issue.

Recommended Actions:
For all system products which use vulnerable versions of Ethereal (tethereal), Avaya recommends that customers restrict local and network access to the server. This restriction should be enforced through the use of physical security, firewalls, ACLs, VPNs, and other generally-accepted networking practices until such time as an update becomes available and can be installed.

3. Additional Information:

Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-800-242-2121, with any questions.

4. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

5. Revision History:

V 1.0 - February 13, 2006 - Initial Statement issued.
V 2.0 - March 6, 2006 - Changed state from Final to Interim.
V 3.0 - February 22, 2008 - Updated actions for CM and SES and changed ASA status to final.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or securityalerts@avaya.com.

© 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.