- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Moderate: ethereal security update
Advisory ID:       RHSA-2005:809-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2005:809.html
Issue date:        2005-10-25
Updated on:        2005-10-25
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3184
- ---------------------------------------------------------------------1. Summary:

Updated Ethereal packages that fix various security vulnerabilities are now
available.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The ethereal package is a program for monitoring network traffic.

A number of security flaws have been discovered in Ethereal. On a system
where Ethereal is running, a remote attacker could send malicious packets
to trigger these flaws and cause Ethereal to crash or potentially execute
arbitrary code. The Common Vulnerabilities and Exposures project
has assigned the names CVE-2005-3241, CVE-2005-3242, CVE-2005-3243,
CVE-2005-3244, CVE-2005-3245, CVE-2005-3246, CVE-2005-3247, CVE-2005-3248,
CVE-2005-3249, and CVE-2005-3184 to these issues.

Users of ethereal should upgrade to these updated packages, which contain
version 0.10.13 and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

171062 - CVE-2005-3241 Multiple ethereal issues (CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3184)


6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
eb36461db1cb0fe47e5fb258481e88aa  ethereal-0.10.13-1.AS21.1.src.rpm

i386:
b22ac1476294a1d178b7592e1ecd55a6  ethereal-0.10.13-1.AS21.1.i386.rpm
278d4ba55468822045b82d0bfec8fb57  ethereal-gnome-0.10.13-1.AS21.1.i386.rpm

ia64:
7c5fd63ebf0b6da8b16eb68598183eb6  ethereal-0.10.13-1.AS21.1.ia64.rpm
c32209e9c951323d6b388a71f4f47156  ethereal-gnome-0.10.13-1.AS21.1.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
eb36461db1cb0fe47e5fb258481e88aa  ethereal-0.10.13-1.AS21.1.src.rpm

ia64:
7c5fd63ebf0b6da8b16eb68598183eb6  ethereal-0.10.13-1.AS21.1.ia64.rpm
c32209e9c951323d6b388a71f4f47156  ethereal-gnome-0.10.13-1.AS21.1.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
eb36461db1cb0fe47e5fb258481e88aa  ethereal-0.10.13-1.AS21.1.src.rpm

i386:
b22ac1476294a1d178b7592e1ecd55a6  ethereal-0.10.13-1.AS21.1.i386.rpm
278d4ba55468822045b82d0bfec8fb57  ethereal-gnome-0.10.13-1.AS21.1.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
eb36461db1cb0fe47e5fb258481e88aa  ethereal-0.10.13-1.AS21.1.src.rpm

i386:
b22ac1476294a1d178b7592e1ecd55a6  ethereal-0.10.13-1.AS21.1.i386.rpm
278d4ba55468822045b82d0bfec8fb57  ethereal-gnome-0.10.13-1.AS21.1.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
840cbaeb806c2fe6a49c5dbbeb453420  ethereal-0.10.13-1.EL3.1.src.rpm

i386:
14420d7aaa42574171df62465c67286c  ethereal-0.10.13-1.EL3.1.i386.rpm
3dd16373ef4d3cf72281c9680a848cd5  ethereal-gnome-0.10.13-1.EL3.1.i386.rpm

ia64:
f38eec0b3ba412e079769050777ade45  ethereal-0.10.13-1.EL3.1.ia64.rpm
5d7b1ffa4769991c36f5f4688c445bc0  ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm

ppc:
240a96840557cee9722b0ba62e8e2923  ethereal-0.10.13-1.EL3.1.ppc.rpm
519431832aa534e2612c57819bdb10a6  ethereal-gnome-0.10.13-1.EL3.1.ppc.rpm

s390:
2a43ed4d130a7cd719e16074a1e4270f  ethereal-0.10.13-1.EL3.1.s390.rpm
8cb30d301f89527fda2cea9598fe1017  ethereal-gnome-0.10.13-1.EL3.1.s390.rpm

s390x:
1addb41c4e2cddb968439caa5073eaa8  ethereal-0.10.13-1.EL3.1.s390x.rpm
777703bf9ddf1f83f6b4b657e4efb5e5  ethereal-gnome-0.10.13-1.EL3.1.s390x.rpm

x86_64:
0395ca339e6b13db2b16c0637b76d02d  ethereal-0.10.13-1.EL3.1.x86_64.rpm
4930b1568ed5872e7d56d5d7ed6e2592  ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
840cbaeb806c2fe6a49c5dbbeb453420  ethereal-0.10.13-1.EL3.1.src.rpm

i386:
14420d7aaa42574171df62465c67286c  ethereal-0.10.13-1.EL3.1.i386.rpm
3dd16373ef4d3cf72281c9680a848cd5  ethereal-gnome-0.10.13-1.EL3.1.i386.rpm

x86_64:
0395ca339e6b13db2b16c0637b76d02d  ethereal-0.10.13-1.EL3.1.x86_64.rpm
4930b1568ed5872e7d56d5d7ed6e2592  ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
840cbaeb806c2fe6a49c5dbbeb453420  ethereal-0.10.13-1.EL3.1.src.rpm

i386:
14420d7aaa42574171df62465c67286c  ethereal-0.10.13-1.EL3.1.i386.rpm
3dd16373ef4d3cf72281c9680a848cd5  ethereal-gnome-0.10.13-1.EL3.1.i386.rpm

ia64:
f38eec0b3ba412e079769050777ade45  ethereal-0.10.13-1.EL3.1.ia64.rpm
5d7b1ffa4769991c36f5f4688c445bc0  ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm

x86_64:
0395ca339e6b13db2b16c0637b76d02d  ethereal-0.10.13-1.EL3.1.x86_64.rpm
4930b1568ed5872e7d56d5d7ed6e2592  ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
840cbaeb806c2fe6a49c5dbbeb453420  ethereal-0.10.13-1.EL3.1.src.rpm

i386:
14420d7aaa42574171df62465c67286c  ethereal-0.10.13-1.EL3.1.i386.rpm
3dd16373ef4d3cf72281c9680a848cd5  ethereal-gnome-0.10.13-1.EL3.1.i386.rpm

ia64:
f38eec0b3ba412e079769050777ade45  ethereal-0.10.13-1.EL3.1.ia64.rpm
5d7b1ffa4769991c36f5f4688c445bc0  ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm

x86_64:
0395ca339e6b13db2b16c0637b76d02d  ethereal-0.10.13-1.EL3.1.x86_64.rpm
4930b1568ed5872e7d56d5d7ed6e2592  ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
d681bea4204b9ef32169854674c69c36  ethereal-0.10.13-1.EL4.1.src.rpm

i386:
7bc624f155cf8417b870b7d800dce0af  ethereal-0.10.13-1.EL4.1.i386.rpm
2035674434fed87a8ab5b8457677fced  ethereal-gnome-0.10.13-1.EL4.1.i386.rpm

ia64:
e47695fc53ab136bfc7f212110773ebf  ethereal-0.10.13-1.EL4.1.ia64.rpm
ee069d182cc115a68cf096e6c344f5b1  ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm

ppc:
edc15234bd865d7f1ae2c1fe9dc585fb  ethereal-0.10.13-1.EL4.1.ppc.rpm
5f62ac7773c040add70aa59f9ccce4c0  ethereal-gnome-0.10.13-1.EL4.1.ppc.rpm

s390:
cbb1c8aa37f993da5d6792ecc4ebd6d5  ethereal-0.10.13-1.EL4.1.s390.rpm
2433e467c4d57b62b33c886e36885c56  ethereal-gnome-0.10.13-1.EL4.1.s390.rpm

s390x:
92889684953c0ed159ab7bcd5e0f4e4d  ethereal-0.10.13-1.EL4.1.s390x.rpm
2eccee9b13a1b25523cb6754b6c895a2  ethereal-gnome-0.10.13-1.EL4.1.s390x.rpm

x86_64:
d3713f0582dc378dbc5a2516681b2917  ethereal-0.10.13-1.EL4.1.x86_64.rpm
edf1cb4236e4fc5808a353a6a7011059  ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
d681bea4204b9ef32169854674c69c36  ethereal-0.10.13-1.EL4.1.src.rpm

i386:
7bc624f155cf8417b870b7d800dce0af  ethereal-0.10.13-1.EL4.1.i386.rpm
2035674434fed87a8ab5b8457677fced  ethereal-gnome-0.10.13-1.EL4.1.i386.rpm

x86_64:
d3713f0582dc378dbc5a2516681b2917  ethereal-0.10.13-1.EL4.1.x86_64.rpm
edf1cb4236e4fc5808a353a6a7011059  ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
d681bea4204b9ef32169854674c69c36  ethereal-0.10.13-1.EL4.1.src.rpm

i386:
7bc624f155cf8417b870b7d800dce0af  ethereal-0.10.13-1.EL4.1.i386.rpm
2035674434fed87a8ab5b8457677fced  ethereal-gnome-0.10.13-1.EL4.1.i386.rpm

ia64:
e47695fc53ab136bfc7f212110773ebf  ethereal-0.10.13-1.EL4.1.ia64.rpm
ee069d182cc115a68cf096e6c344f5b1  ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm

x86_64:
d3713f0582dc378dbc5a2516681b2917  ethereal-0.10.13-1.EL4.1.x86_64.rpm
edf1cb4236e4fc5808a353a6a7011059  ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
d681bea4204b9ef32169854674c69c36  ethereal-0.10.13-1.EL4.1.src.rpm

i386:
7bc624f155cf8417b870b7d800dce0af  ethereal-0.10.13-1.EL4.1.i386.rpm
2035674434fed87a8ab5b8457677fced  ethereal-gnome-0.10.13-1.EL4.1.i386.rpm

ia64:
e47695fc53ab136bfc7f212110773ebf  ethereal-0.10.13-1.EL4.1.ia64.rpm
ee069d182cc115a68cf096e6c344f5b1  ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm

x86_64:
d3713f0582dc378dbc5a2516681b2917  ethereal-0.10.13-1.EL4.1.x86_64.rpm
edf1cb4236e4fc5808a353a6a7011059  ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3241
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3246
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3247
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3184

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

RedHat: Moderate: ethereal security update RHSA-2005:809-01

Updated Ethereal packages that fix various security vulnerabilities are now available

Summary



Summary

The ethereal package is a program for monitoring network traffic. A number of security flaws have been discovered in Ethereal. On a system where Ethereal is running, a remote attacker could send malicious packets to trigger these flaws and cause Ethereal to crash or potentially execute arbitrary code. The Common Vulnerabilities and Exposures project has assigned the names CVE-2005-3241, CVE-2005-3242, CVE-2005-3243, CVE-2005-3244, CVE-2005-3245, CVE-2005-3246, CVE-2005-3247, CVE-2005-3248, CVE-2005-3249, and CVE-2005-3184 to these issues. Users of ethereal should upgrade to these updated packages, which contain version 0.10.13 and are not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
171062 - CVE-2005-3241 Multiple ethereal issues (CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3184)

6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS: eb36461db1cb0fe47e5fb258481e88aa ethereal-0.10.13-1.AS21.1.src.rpm
i386: b22ac1476294a1d178b7592e1ecd55a6 ethereal-0.10.13-1.AS21.1.i386.rpm 278d4ba55468822045b82d0bfec8fb57 ethereal-gnome-0.10.13-1.AS21.1.i386.rpm
ia64: 7c5fd63ebf0b6da8b16eb68598183eb6 ethereal-0.10.13-1.AS21.1.ia64.rpm c32209e9c951323d6b388a71f4f47156 ethereal-gnome-0.10.13-1.AS21.1.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS: eb36461db1cb0fe47e5fb258481e88aa ethereal-0.10.13-1.AS21.1.src.rpm
ia64: 7c5fd63ebf0b6da8b16eb68598183eb6 ethereal-0.10.13-1.AS21.1.ia64.rpm c32209e9c951323d6b388a71f4f47156 ethereal-gnome-0.10.13-1.AS21.1.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS: eb36461db1cb0fe47e5fb258481e88aa ethereal-0.10.13-1.AS21.1.src.rpm
i386: b22ac1476294a1d178b7592e1ecd55a6 ethereal-0.10.13-1.AS21.1.i386.rpm 278d4ba55468822045b82d0bfec8fb57 ethereal-gnome-0.10.13-1.AS21.1.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS: eb36461db1cb0fe47e5fb258481e88aa ethereal-0.10.13-1.AS21.1.src.rpm
i386: b22ac1476294a1d178b7592e1ecd55a6 ethereal-0.10.13-1.AS21.1.i386.rpm 278d4ba55468822045b82d0bfec8fb57 ethereal-gnome-0.10.13-1.AS21.1.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS: 840cbaeb806c2fe6a49c5dbbeb453420 ethereal-0.10.13-1.EL3.1.src.rpm
i386: 14420d7aaa42574171df62465c67286c ethereal-0.10.13-1.EL3.1.i386.rpm 3dd16373ef4d3cf72281c9680a848cd5 ethereal-gnome-0.10.13-1.EL3.1.i386.rpm
ia64: f38eec0b3ba412e079769050777ade45 ethereal-0.10.13-1.EL3.1.ia64.rpm 5d7b1ffa4769991c36f5f4688c445bc0 ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm
ppc: 240a96840557cee9722b0ba62e8e2923 ethereal-0.10.13-1.EL3.1.ppc.rpm 519431832aa534e2612c57819bdb10a6 ethereal-gnome-0.10.13-1.EL3.1.ppc.rpm
s390: 2a43ed4d130a7cd719e16074a1e4270f ethereal-0.10.13-1.EL3.1.s390.rpm 8cb30d301f89527fda2cea9598fe1017 ethereal-gnome-0.10.13-1.EL3.1.s390.rpm
s390x: 1addb41c4e2cddb968439caa5073eaa8 ethereal-0.10.13-1.EL3.1.s390x.rpm 777703bf9ddf1f83f6b4b657e4efb5e5 ethereal-gnome-0.10.13-1.EL3.1.s390x.rpm
x86_64: 0395ca339e6b13db2b16c0637b76d02d ethereal-0.10.13-1.EL3.1.x86_64.rpm 4930b1568ed5872e7d56d5d7ed6e2592 ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm
Red Hat Desktop version 3:
SRPMS: 840cbaeb806c2fe6a49c5dbbeb453420 ethereal-0.10.13-1.EL3.1.src.rpm
i386: 14420d7aaa42574171df62465c67286c ethereal-0.10.13-1.EL3.1.i386.rpm 3dd16373ef4d3cf72281c9680a848cd5 ethereal-gnome-0.10.13-1.EL3.1.i386.rpm
x86_64: 0395ca339e6b13db2b16c0637b76d02d ethereal-0.10.13-1.EL3.1.x86_64.rpm 4930b1568ed5872e7d56d5d7ed6e2592 ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS: 840cbaeb806c2fe6a49c5dbbeb453420 ethereal-0.10.13-1.EL3.1.src.rpm
i386: 14420d7aaa42574171df62465c67286c ethereal-0.10.13-1.EL3.1.i386.rpm 3dd16373ef4d3cf72281c9680a848cd5 ethereal-gnome-0.10.13-1.EL3.1.i386.rpm
ia64: f38eec0b3ba412e079769050777ade45 ethereal-0.10.13-1.EL3.1.ia64.rpm 5d7b1ffa4769991c36f5f4688c445bc0 ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm
x86_64: 0395ca339e6b13db2b16c0637b76d02d ethereal-0.10.13-1.EL3.1.x86_64.rpm 4930b1568ed5872e7d56d5d7ed6e2592 ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS: 840cbaeb806c2fe6a49c5dbbeb453420 ethereal-0.10.13-1.EL3.1.src.rpm
i386: 14420d7aaa42574171df62465c67286c ethereal-0.10.13-1.EL3.1.i386.rpm 3dd16373ef4d3cf72281c9680a848cd5 ethereal-gnome-0.10.13-1.EL3.1.i386.rpm
ia64: f38eec0b3ba412e079769050777ade45 ethereal-0.10.13-1.EL3.1.ia64.rpm 5d7b1ffa4769991c36f5f4688c445bc0 ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm
x86_64: 0395ca339e6b13db2b16c0637b76d02d ethereal-0.10.13-1.EL3.1.x86_64.rpm 4930b1568ed5872e7d56d5d7ed6e2592 ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS: d681bea4204b9ef32169854674c69c36 ethereal-0.10.13-1.EL4.1.src.rpm
i386: 7bc624f155cf8417b870b7d800dce0af ethereal-0.10.13-1.EL4.1.i386.rpm 2035674434fed87a8ab5b8457677fced ethereal-gnome-0.10.13-1.EL4.1.i386.rpm
ia64: e47695fc53ab136bfc7f212110773ebf ethereal-0.10.13-1.EL4.1.ia64.rpm ee069d182cc115a68cf096e6c344f5b1 ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm
ppc: edc15234bd865d7f1ae2c1fe9dc585fb ethereal-0.10.13-1.EL4.1.ppc.rpm 5f62ac7773c040add70aa59f9ccce4c0 ethereal-gnome-0.10.13-1.EL4.1.ppc.rpm
s390: cbb1c8aa37f993da5d6792ecc4ebd6d5 ethereal-0.10.13-1.EL4.1.s390.rpm 2433e467c4d57b62b33c886e36885c56 ethereal-gnome-0.10.13-1.EL4.1.s390.rpm
s390x: 92889684953c0ed159ab7bcd5e0f4e4d ethereal-0.10.13-1.EL4.1.s390x.rpm 2eccee9b13a1b25523cb6754b6c895a2 ethereal-gnome-0.10.13-1.EL4.1.s390x.rpm
x86_64: d3713f0582dc378dbc5a2516681b2917 ethereal-0.10.13-1.EL4.1.x86_64.rpm edf1cb4236e4fc5808a353a6a7011059 ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: d681bea4204b9ef32169854674c69c36 ethereal-0.10.13-1.EL4.1.src.rpm
i386: 7bc624f155cf8417b870b7d800dce0af ethereal-0.10.13-1.EL4.1.i386.rpm 2035674434fed87a8ab5b8457677fced ethereal-gnome-0.10.13-1.EL4.1.i386.rpm
x86_64: d3713f0582dc378dbc5a2516681b2917 ethereal-0.10.13-1.EL4.1.x86_64.rpm edf1cb4236e4fc5808a353a6a7011059 ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: d681bea4204b9ef32169854674c69c36 ethereal-0.10.13-1.EL4.1.src.rpm
i386: 7bc624f155cf8417b870b7d800dce0af ethereal-0.10.13-1.EL4.1.i386.rpm 2035674434fed87a8ab5b8457677fced ethereal-gnome-0.10.13-1.EL4.1.i386.rpm
ia64: e47695fc53ab136bfc7f212110773ebf ethereal-0.10.13-1.EL4.1.ia64.rpm ee069d182cc115a68cf096e6c344f5b1 ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm
x86_64: d3713f0582dc378dbc5a2516681b2917 ethereal-0.10.13-1.EL4.1.x86_64.rpm edf1cb4236e4fc5808a353a6a7011059 ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: d681bea4204b9ef32169854674c69c36 ethereal-0.10.13-1.EL4.1.src.rpm
i386: 7bc624f155cf8417b870b7d800dce0af ethereal-0.10.13-1.EL4.1.i386.rpm 2035674434fed87a8ab5b8457677fced ethereal-gnome-0.10.13-1.EL4.1.i386.rpm
ia64: e47695fc53ab136bfc7f212110773ebf ethereal-0.10.13-1.EL4.1.ia64.rpm ee069d182cc115a68cf096e6c344f5b1 ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm
x86_64: d3713f0582dc378dbc5a2516681b2917 ethereal-0.10.13-1.EL4.1.x86_64.rpm edf1cb4236e4fc5808a353a6a7011059 ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3241 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3242 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3246 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3247 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3184

Package List


Severity
Advisory ID: RHSA-2005:809-01
Advisory URL: https://access.redhat.com/errata/RHSA-2005:809.html
Issued Date: : 2005-10-25
Updated on: 2005-10-25
Product: Red Hat Enterprise Linux
CVE Names: CVE-2005-3241 CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3184 Updated Ethereal packages that fix various security vulnerabilities are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64

Red Hat Linux Advanced Workstation 2.1 - ia64

Red Hat Enterprise Linux ES version 2.1 - i386

Red Hat Enterprise Linux WS version 2.1 - i386

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Desktop version 3 - i386, x86_64

Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64


Bugs Fixed


Related News