Linux Security
    Linux Security
    Linux Security

    Debian: ethereal denial of service fix

    Date 21 Dec 2004
    Posted By Joe Shakespeare
    Brian Caswell discovered that an improperly formatted SMB packet could make ethereal hang and eat CPU endlessly.
    Debian Security Advisory DSA 613-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    December 21st, 2004           
    Package        : ethereal
    Vulnerability  : infinite loop
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2004-1142
    Brian Caswell discovered that an improperly formatted SMB packet could
    make ethereal hang and eat CPU endlessly.
    For the stable distribution (woody) this problem has been fixed in
    version 0.9.4-1woody9.
    For the unstable distribution (sid) this problem has been fixed in
    version 0.10.8-1.
    We recommend that you upgrade your ethereal packages.
    Upgrade Instructions
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
      Source archives:
          Size/MD5 checksum:      679 7c9fc119387a101d71755c93662928c1
          Size/MD5 checksum:    40182 180ee910159fccf800116faea66351b5
          Size/MD5 checksum:  3278908 42e999daa659820ee93aaaa39ea1e9ea
      Alpha architecture:
          Size/MD5 checksum:  1940992 b189e878ca4b14f76bf900063606a7b0
          Size/MD5 checksum:   334414 9874a562be22514d55d6bb804356388e
          Size/MD5 checksum:   222344 5776dfeda09c103939470d17146ba319
          Size/MD5 checksum:  1707744 5c4e9f13ea8e9b88839c95e5c683ad64
      ARM architecture:
          Size/MD5 checksum:  1635506 1402ca58aef147adb7b68c529c8edfd9
          Size/MD5 checksum:   297648 7fdce14cf96d7dcec0bf2138a0d348bc
          Size/MD5 checksum:   206252 6a296cfcb0c4976b3e574c2397523ea6
          Size/MD5 checksum:  1439488 09d2b0ce610e967467205b2ed4d9483e
      Intel IA-32 architecture:
          Size/MD5 checksum:  1512774 e558c9641615ed6d354d62809b6e7868
          Size/MD5 checksum:   286664 dac97c8964dd8a224ea820da16a1cedc
          Size/MD5 checksum:   198484 372e09b54e12b9eddcb84307de96459b
          Size/MD5 checksum:  1326330 4ff43fc479633d40999cbc4e2a11bbae
      Intel IA-64 architecture:
          Size/MD5 checksum:  2150402 34f57b395472c4a4fc4904dd4680ce77
          Size/MD5 checksum:   373290 42e6b6bdeeefaf43626af576f24b036a
          Size/MD5 checksum:   233910 f81908fa68c166bd23bbf6bb00eebae9
          Size/MD5 checksum:  1861830 6d150a0551baffc42484d0bb31a0a299
      HP Precision architecture:
          Size/MD5 checksum:  1804730 ba392710dc9bcf400231310ca589fb0d
          Size/MD5 checksum:   322632 4b45250011aa5b19c8d7dd808a91e77b
          Size/MD5 checksum:   217082 f31d2680bbb79b1b5578e265ed10130a
          Size/MD5 checksum:  1575894 cd8265875f022dbb9e5be10c52cf1ec0
      Motorola 680x0 architecture:
          Size/MD5 checksum:  1424750 e0795e69c7116b13edf1104a4f2441a0
          Size/MD5 checksum:   282924 e54a4743b1606c4a8e79e20eefaf399f
          Size/MD5 checksum:   195300 6d8c88341037a3dcf01e6ead2ed9ef47
          Size/MD5 checksum:  1248924 3ad25c0e91a05847fd136902ad6bcef3
      Big endian MIPS architecture:
          Size/MD5 checksum:  1617096 4f5104b12b9c93803bfeb398dd33583c
          Size/MD5 checksum:   305428 ac322c962a941c95bd472e993162a172
          Size/MD5 checksum:   213860 13d0bbf8f7fc00abce3a171c88cee606
          Size/MD5 checksum:  1422094 f68867262f4503f85f4a6c7ccbe32360
      Little endian MIPS architecture:
          Size/MD5 checksum:  1598188 39314d770738fca475a3045a34643532
          Size/MD5 checksum:   304908 b1291df1d183711d9842708c29147187
          Size/MD5 checksum:   213514 136725ad81c8c754dee664a4e0a46584
          Size/MD5 checksum:  1406420 977d0952fcb3f9901fb302f5d7bb37a4
      PowerPC architecture:
          Size/MD5 checksum:  1618546 bbd977299f1076fc24289d52592f7b87
          Size/MD5 checksum:   302114 981bfa8b3ad7e28dbdfa7c9a68484767
          Size/MD5 checksum:   209080 e0b3edebac1c822f2a1972a2020bbddd
          Size/MD5 checksum:  1419340 7bd6a1c1f4733451e878fe9c2d245ba2
      IBM S/390 architecture:
          Size/MD5 checksum:  1574736 3a888ba7afb31343ccce8c4c0c57a58a
          Size/MD5 checksum:   300942 3e49c0c5c0e1ab8bda5efbe4888f826d
          Size/MD5 checksum:   204178 04760a79c990c84e9e134efbd93659d9
          Size/MD5 checksum:  1387436 5391d292ee32f628b491f4e7f337d937
      Sun Sparc architecture:
          Size/MD5 checksum:  1583332 7f4195f17884ab22d47b9ef9af31a94e
          Size/MD5 checksum:   318224 3c2777424b4b317ca4fc19b931b1649e
          Size/MD5 checksum:   204954 3353eefa66978c883a303a7d76ad052b
          Size/MD5 checksum:  1389376 40b74f94dc36f0c4b4237547d2a1f469
      These files will probably be moved into the stable distribution on
      its next update.
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.