- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200505-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: High
     Title: Ethereal: Numerous vulnerabilities
      Date: May 06, 2005
      Bugs: #90539
        ID: 200505-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======
Ethereal is vulnerable to numerous vulnerabilities potentially
resulting in the execution of arbitrary code or abnormal termination.

Background
=========
Ethereal is a feature rich network protocol analyzer.

Affected packages
================
    -------------------------------------------------------------------
     Package                /  Vulnerable  /                Unaffected
    -------------------------------------------------------------------
  1  net-analyzer/ethereal      < 0.10.11                   >= 0.10.11

Description
==========
There are numerous vulnerabilities in versions of Ethereal prior to
0.10.11, including:

* The ANSI A and DHCP dissectors are vulnerable to format string
  vulnerabilities.

* The DISTCC, FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP,
  PKIX1Explitit, PKIX Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP
  and Presentation dissectors are vulnerable to buffer overflows.

* The KINK, WSP, SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB
  NETLOGON dissectors are vulnerable to pointer handling errors.

* The LMP, KINK, MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and
  L2TP dissectors are vulnerable to looping problems.

* The Telnet and DHCP dissectors could abort.

* The TZSP, Bittorrent, SMB, MGCP and ISUP dissectors could cause a
  segmentation fault.

* The WSP, 802.3 Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2,
  RADIUS, SMB PIPE, MRDISC and TCAP dissectors could throw assertions.

* The DICOM, NDPS and ICEP dissectors are vulnerable to memory
  handling errors.

* The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP
  dissectors could terminate abnormallly.

Impact
=====
An attacker might be able to use these vulnerabilities to crash
Ethereal and execute arbitrary code with the permissions of the user
running Ethereal, which could be the root user.

Workaround
=========
There is no known workaround at this time.

Resolution
=========
All Ethereal users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11"

References
=========
  [ 1 ] Ethereal enpa-sa-00019
          [ 2 ] CAN-2005-1456
          [ 3 ] CAN-2005-1457
          [ 4 ] CAN-2005-1458
          [ 5 ] CAN-2005-1459
          [ 6 ] CAN-2005-1460
          [ 7 ] CAN-2005-1461
          [ 8 ] CAN-2005-1462
          [ 9 ] CAN-2005-1463
          [ 10 ] CAN-2005-1464
           [ 11 ] CAN-2005-1465
           [ 12 ] CAN-2005-1466
           [ 13 ] CAN-2005-1467
           [ 14 ] CAN-2005-1468
           [ 15 ] CAN-2005-1469
           [ 16 ] CAN-2005-1470
         
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  https://security.gentoo.org/glsa/200505-03

Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org/.

License
======
Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.0/

Gentoo: GLSA-200505-03: Ethereal: Numerous vulnerabilities

Ethereal is vulnerable to numerous vulnerabilities potentially resulting in the execution of arbitrary code or abnormal termination.

Summary

Gentoo Linux Security Advisory GLSA 200505-03 https://security.gentoo.org/ Severity: High Title: Ethereal: Numerous vulnerabilities Date: May 06, 2005 Bugs: #90539 ID: 200505-03

Synopsis ======= Ethereal is vulnerable to numerous vulnerabilities potentially resulting in the execution of arbitrary code or abnormal termination.
Background ========= Ethereal is a feature rich network protocol analyzer.
Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-analyzer/ethereal < 0.10.11 >= 0.10.11
========== There are numerous vulnerabilities in versions of Ethereal prior to 0.10.11, including:
* The ANSI A and DHCP dissectors are vulnerable to format string vulnerabilities.
* The DISTCC, FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS, OCSP, PKIX1Explitit, PKIX Qualified, X.509, Q.931, MEGACO, NCP, ISUP, TCAP and Presentation dissectors are vulnerable to buffer overflows.
* The KINK, WSP, SMB Mailslot, H.245, MGCP, Q.931, RPC, GSM and SMB NETLOGON dissectors are vulnerable to pointer handling errors.
* The LMP, KINK, MGCP, RSVP, SRVLOC, EIGRP, MEGACO, DLSw, NCP and L2TP dissectors are vulnerable to looping problems.
* The Telnet and DHCP dissectors could abort.
* The TZSP, Bittorrent, SMB, MGCP and ISUP dissectors could cause a segmentation fault.
* The WSP, 802.3 Slow protocols, BER, SMB Mailslot, SMB, NDPS, IAX2, RADIUS, SMB PIPE, MRDISC and TCAP dissectors could throw assertions.
* The DICOM, NDPS and ICEP dissectors are vulnerable to memory handling errors.
* The GSM MAP, AIM, Fibre Channel,SRVLOC, NDPS, LDAP and NTLMSSP dissectors could terminate abnormallly.
Impact ===== An attacker might be able to use these vulnerabilities to crash Ethereal and execute arbitrary code with the permissions of the user running Ethereal, which could be the root user.
Workaround ========= There is no known workaround at this time.
Resolution ========= All Ethereal users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11"
References ========= [ 1 ] Ethereal enpa-sa-00019 [ 2 ] CAN-2005-1456 [ 3 ] CAN-2005-1457 [ 4 ] CAN-2005-1458 [ 5 ] CAN-2005-1459 [ 6 ] CAN-2005-1460 [ 7 ] CAN-2005-1461 [ 8 ] CAN-2005-1462 [ 9 ] CAN-2005-1463 [ 10 ] CAN-2005-1464 [ 11 ] CAN-2005-1465 [ 12 ] CAN-2005-1466 [ 13 ] CAN-2005-1467 [ 14 ] CAN-2005-1468 [ 15 ] CAN-2005-1469 [ 16 ] CAN-2005-1470
Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/200505-03
Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org/.
License ====== Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.0/

Resolution

References

Availability

Concerns

Severity

Synopsis

Background

Affected Packages

Impact

Workaround

Related News