[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Redhat : Updated Ethereal packages fix security issues



Updated Ethereal packages fix security issues
Advisory: RHSA-2003:203-05
Last updated on: 2003-07-03
Affected Products: Red Hat Linux 7.2
Red Hat Linux 7.3
Red Hat Linux 8.0
Red Hat Linux 9
CVEs (cve.mitre.org): CAN-2003-0356
CAN-2003-0357
CAN-2003-0428
CAN-2003-0429
CAN-2003-0430
CAN-2003-0431
CAN-2003-0432

back

[Security Advisory]   Security Advisory

Details:

Updated Ethereal packages available to fix a number of remotely
exploitable security issues

Ethereal is a program for monitoring network traffic.

A number of security issues affect Ethereal. By exploiting these issues it
may be possible to make Ethereal crash or run arbitrary code by injecting a
purposefully malformed packet onto the wire or by convincing someone to
read a malformed packet trace file.

Multiple off-by-one vulnerabilities exist in Ethereal 0.9.11 and earlier in
the AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3, Rsync, SMB, SMPP,
and TSP dissectors. They do not properly use the tvb_get_nstringz and
tvb_get_nstringz0 functions. Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0356 to these issues.

Multiple integer overflow vulnerabilities exist in Ethereal 0.9.11 and
earlier in the Mount and PPP dissectors. (CAN-2003-0357)

A vulnerability in the DCERPC dissector exists in Ethereal 0.9.12 and
earlier, allowing remote attackers to cause a denial of service (memory
consumption) via a certain NDR string. (CAN-2003-0428)

The OSI dissector in Ethereal 0.9.12 and earlier causes by invalid IPv4 or
IPv6 prefix lengths, possibly triggering a buffer overflow. (CAN-2003-0429)

The SPNEGO dissector in Ethereal 0.9.12 and earlier allows remote attackers
to cause a denial of service (crash) via an invalid ASN.1 value.
(CAN-2003-0430)

The tvb_get_nstringz0 function in Ethereal 0.9.12 and earlier does not
properly handle a zero-length buffer size. (CAN-2003-0431)

Ethereal 0.9.12 and earlier does not handle certain strings properly in the
BGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP, ISIS, and RMI dissectors.
(CAN-2003-0432)

Users of Ethereal should update to the erratum packages containing Ethereal
version 0.9.13, which are not vulnerable to these issues.

Updated packages:
Red Hat Linux 7.2
SRPMS:
ethereal-0.9.13-1.72.1.src.rpm
[ via FTP ] [ via HTTP ]     bd9ea773029a00543c2b86efd2f253db
 
i386:
ethereal-0.9.13-1.72.1.i386.rpm
[ via FTP ] [ via HTTP ]     adda580cd763deba0940b47d2cb28f20
ethereal-gnome-0.9.13-1.72.1.i386.rpm
[ via FTP ] [ via HTTP ]     dbe53fa5716f9cee9859c1d4435d2e76
 
ia64:
ethereal-0.9.13-1.72.1.ia64.rpm
[ via FTP ] [ via HTTP ]     52f6b8ceacc3946743c116ea41af9651
ethereal-gnome-0.9.13-1.72.1.ia64.rpm
[ via FTP ] [ via HTTP ]     23de069f33cd2da4c40c60288ae9e10b
 
Red Hat Linux 7.3
SRPMS:
ethereal-0.9.13-1.73.1.src.rpm
[ via FTP ] [ via HTTP ]     189f889e31de3bb9efd06b55282f741e
 
i386:
ethereal-0.9.13-1.73.1.i386.rpm
[ via FTP ] [ via HTTP ]     3bc7319ef3cf5dcd3fc491eb323bd473
ethereal-gnome-0.9.13-1.73.1.i386.rpm
[ via FTP ] [ via HTTP ]     a7c84fc309ff33b5666de9f298946f6f
 
Red Hat Linux 8.0
SRPMS:
ethereal-0.9.13-1.80.1.src.rpm
[ via FTP ] [ via HTTP ]     ac016f9ed706b0cf8d75be2ccced0a4c
 
i386:
ethereal-0.9.13-1.80.1.i386.rpm
[ via FTP ] [ via HTTP ]     3ab512b8de7c7ad17bf43b7b0d4307ed
ethereal-gnome-0.9.13-1.80.1.i386.rpm
[ via FTP ] [ via HTTP ]     0f4961aa67c6540c735c9ed4959881ef
 
Red Hat Linux 9
SRPMS:
ethereal-0.9.13-1.90.1.src.rpm
[ via FTP ] [ via HTTP ]     28cd7262e8f2d814bec2a871961d7444
 
i386:
ethereal-0.9.13-1.90.1.i386.rpm
[ via FTP ] [ via HTTP ]     7253c66d80ce49bc79c0cd8749c710e3
ethereal-gnome-0.9.13-1.90.1.i386.rpm
[ via FTP ] [ via HTTP ]     3d3394064db2d9ece3568b6af251575a
 

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network. To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Bugs fixed:  (see bugzilla for more information)

85179 - SOCKS format string vuln in Ethereal 0.9.8/9

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0428
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0432
http://www.ethereal.com/appnotes/enpa-sa-00009.html
http://www.ethereal.com/appnotes/enpa-sa-00010.html

Keywords:

buffer, ethereal, overflow, SOCKS

The listed packages are GPG signed by Red Hat, Inc. for security. Our key is available at:
http://www.redhat.com/solutions/security/news/publickey/#key

You can verify each package and see who signed it with the following command:
rpm --checksig -v filename

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
md5sum filename

The Red Hat security contact is security@redhat.com. More contact details at http://www.redhat.com/solutions/security/news/contact.html