Secunia Advisory: SA10424
Release Date: 2003-12-13
Critical: Less critical
Impact: DoS
Where: From remote
Software: Ethereal 0.x
Description:
Two vulnerabilities have been reported in Ethereal, which can be exploited by malicious people to crash the application.
An unspecified error can be exploited to cause a segmentation fault, if a user selects "Match->Selected" or "Prepare->Selected" for a malformed SMB packet. It is reportedly not known, whether this issue also can be exploited to execute arbitrary code on an affected system.
A NULL pointer dereference bug in the Q.931 protocol dissector can be exploited to crash Ethereal / Tethereal by sending a malformed packet.
Solution:
Update to version 0.10.1.
http://www.ethereal.com/download.html
Disable SMB and Q.931 protocol dissectors.
http://www.secunia.com/advisories/10424/

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic