RedHat: Updated Ethereal packages fix security issues

    Date02 Feb 2005
    CategoryRed Hat
    5827
    Posted ByLinuxSecurity Advisories
    Updated Ethereal packages that fix various security vulnerabilities are now available.
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Updated Ethereal packages fix security issues
    Advisory ID:       RHSA-2005:011-01
    Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-011.html
    Issue date:        2005-02-02
    Updated on:        2005-02-02
    Product:           Red Hat Enterprise Linux
    Obsoletes:         RHSA-2004:378
    CVE Names:         CAN-2004-1139 CAN-2004-1140 CAN-2004-1141 CAN-2004-1142 CAN-2005-0007 CAN-2005-0008 CAN-2005-0009 CAN-2005-0010 CAN-2005-0084
    - ---------------------------------------------------------------------
    
    1. Summary:
    
    Updated Ethereal packages that fix various security vulnerabilities are now
    available.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
    Red Hat Linux Advanced Workstation 2.1 - ia64
    Red Hat Enterprise Linux ES version 2.1 - i386
    Red Hat Enterprise Linux WS version 2.1 - i386
    Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
    Red Hat Desktop version 3 - i386, x86_64
    Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
    Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
    
    3. Problem description:
    
    Ethereal is a program for monitoring network traffic.
    
    A number of security flaws have been discovered in Ethereal. On a system
    where Ethereal is running, a remote attacker could send malicious packets
    to trigger these flaws.
    
    A flaw in the DICOM dissector could cause a crash. The Common
    Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CAN-2004-1139 to this issue.
    
    A invalid RTP timestamp could hang Ethereal and create a large temporary
    file, possibly filling available disk space. (CAN-2004-1140)
    
    The HTTP dissector could access previously-freed memory, causing a crash.
    (CAN-2004-1141)
    
    An improperly formatted SMB packet could make Ethereal hang, maximizing CPU
    utilization. (CAN-2004-1142)
    
    The COPS dissector could go into an infinite loop. (CAN-2005-0006)
    
    The DLSw dissector could cause an assertion, making Ethereal exit
    prematurely. (CAN-2005-0007)
    
    The DNP dissector could cause memory corruption. (CAN-2005-0008)
    
    The Gnutella dissector could cause an assertion, making Ethereal exit
    prematurely. (CAN-2005-0009)
    
    The MMSE dissector could free static memory, causing a crash. (CAN-2005-0010)
    
    The X11 protocol dissector is vulnerable to a string buffer overflow.
    (CAN-2005-0084)
    
    Users of Ethereal should upgrade to these updated packages which contain
    version 0.10.9 that is not vulnerable to these issues.
    
    4. Solution:
    
    Before applying this update, make sure that all previously-released
    errata relevant to your system have been applied.  Use Red Hat
    Network to download and update your packages.  To launch the Red Hat
    Update Agent, use the following command:
    
        up2date
    
    For information on how to install packages manually, refer to the
    following Web page for the System Administration or Customization
    guide specific to your system:
    
        http://www.redhat.com/docs/manuals/enterprise/
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/):
    
    142952 - CAN-2004-1139 Ethereal flaws (CAN-2004-1140 CAN-2004-1141 CAN-2004-1142)
    145481 - CAN-2005-0006 multiple ethereal issues (CAN-2005-0007 CAN-2005-0008 CAN-2005-0009 CAN-2005-0010 CAN-2005-0084)
    
    6. RPMs required:
    
    Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.10.9-1.AS21.1.src.rpm
    d34ab57b362f91de5700585f2dfe7c8b  ethereal-0.10.9-1.AS21.1.src.rpm
    
    i386:
    77bd956f37f71564833412f6524a0e1c  ethereal-0.10.9-1.AS21.1.i386.rpm
    7a8a36ad8bcc2ba31c00090416f06e3c  ethereal-gnome-0.10.9-1.AS21.1.i386.rpm
    
    ia64:
    849dc6fe5edd7ca3d1bc38c72270253c  ethereal-0.10.9-1.AS21.1.ia64.rpm
    52bf0df7688828650a9a89d1e1d55910  ethereal-gnome-0.10.9-1.AS21.1.ia64.rpm
    
    Red Hat Linux Advanced Workstation 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.10.9-1.AS21.1.src.rpm
    d34ab57b362f91de5700585f2dfe7c8b  ethereal-0.10.9-1.AS21.1.src.rpm
    
    ia64:
    849dc6fe5edd7ca3d1bc38c72270253c  ethereal-0.10.9-1.AS21.1.ia64.rpm
    52bf0df7688828650a9a89d1e1d55910  ethereal-gnome-0.10.9-1.AS21.1.ia64.rpm
    
    Red Hat Enterprise Linux ES version 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.10.9-1.AS21.1.src.rpm
    d34ab57b362f91de5700585f2dfe7c8b  ethereal-0.10.9-1.AS21.1.src.rpm
    
    i386:
    77bd956f37f71564833412f6524a0e1c  ethereal-0.10.9-1.AS21.1.i386.rpm
    7a8a36ad8bcc2ba31c00090416f06e3c  ethereal-gnome-0.10.9-1.AS21.1.i386.rpm
    
    Red Hat Enterprise Linux WS version 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.10.9-1.AS21.1.src.rpm
    d34ab57b362f91de5700585f2dfe7c8b  ethereal-0.10.9-1.AS21.1.src.rpm
    
    i386:
    77bd956f37f71564833412f6524a0e1c  ethereal-0.10.9-1.AS21.1.i386.rpm
    7a8a36ad8bcc2ba31c00090416f06e3c  ethereal-gnome-0.10.9-1.AS21.1.i386.rpm
    
    Red Hat Enterprise Linux AS version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.10.9-1.EL3.1.src.rpm
    04fec41b6b2bb91daeac6a798aa7851c  ethereal-0.10.9-1.EL3.1.src.rpm
    
    i386:
    9d49bf8347c7959c5e25193017ace76d  ethereal-0.10.9-1.EL3.1.i386.rpm
    2c2783bacc7346d4e6c2e5e4ca03be7b  ethereal-gnome-0.10.9-1.EL3.1.i386.rpm
    
    ia64:
    4fc0567ea34cf3a2739eae5164716447  ethereal-0.10.9-1.EL3.1.ia64.rpm
    c2561995bed9ceae011ed0919ad20a1a  ethereal-gnome-0.10.9-1.EL3.1.ia64.rpm
    
    ppc:
    b31e416c3e60700b89dcf159ad17ae12  ethereal-0.10.9-1.EL3.1.ppc.rpm
    b107c7af04873dc6f1ad36fb7997be06  ethereal-gnome-0.10.9-1.EL3.1.ppc.rpm
    
    s390:
    091392ff4fd5c7622be8d400472d81a3  ethereal-0.10.9-1.EL3.1.s390.rpm
    4ea3d5ca3dc80d44c148e6d0c1fa5e5d  ethereal-gnome-0.10.9-1.EL3.1.s390.rpm
    
    s390x:
    a3be8c593e45081a19ed649de55345d7  ethereal-0.10.9-1.EL3.1.s390x.rpm
    60009d9e0687857a0d20503d4637ca0f  ethereal-gnome-0.10.9-1.EL3.1.s390x.rpm
    
    x86_64:
    6cd423bc315ba6512d502a42ea0704d4  ethereal-0.10.9-1.EL3.1.x86_64.rpm
    85a1ef6aa68b81f2eee6508b6fcf332c  ethereal-gnome-0.10.9-1.EL3.1.x86_64.rpm
    
    Red Hat Desktop version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/ethereal-0.10.9-1.EL3.1.src.rpm
    04fec41b6b2bb91daeac6a798aa7851c  ethereal-0.10.9-1.EL3.1.src.rpm
    
    i386:
    9d49bf8347c7959c5e25193017ace76d  ethereal-0.10.9-1.EL3.1.i386.rpm
    2c2783bacc7346d4e6c2e5e4ca03be7b  ethereal-gnome-0.10.9-1.EL3.1.i386.rpm
    
    x86_64:
    6cd423bc315ba6512d502a42ea0704d4  ethereal-0.10.9-1.EL3.1.x86_64.rpm
    85a1ef6aa68b81f2eee6508b6fcf332c  ethereal-gnome-0.10.9-1.EL3.1.x86_64.rpm
    
    Red Hat Enterprise Linux ES version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.10.9-1.EL3.1.src.rpm
    04fec41b6b2bb91daeac6a798aa7851c  ethereal-0.10.9-1.EL3.1.src.rpm
    
    i386:
    9d49bf8347c7959c5e25193017ace76d  ethereal-0.10.9-1.EL3.1.i386.rpm
    2c2783bacc7346d4e6c2e5e4ca03be7b  ethereal-gnome-0.10.9-1.EL3.1.i386.rpm
    
    ia64:
    4fc0567ea34cf3a2739eae5164716447  ethereal-0.10.9-1.EL3.1.ia64.rpm
    c2561995bed9ceae011ed0919ad20a1a  ethereal-gnome-0.10.9-1.EL3.1.ia64.rpm
    
    x86_64:
    6cd423bc315ba6512d502a42ea0704d4  ethereal-0.10.9-1.EL3.1.x86_64.rpm
    85a1ef6aa68b81f2eee6508b6fcf332c  ethereal-gnome-0.10.9-1.EL3.1.x86_64.rpm
    
    Red Hat Enterprise Linux WS version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.10.9-1.EL3.1.src.rpm
    04fec41b6b2bb91daeac6a798aa7851c  ethereal-0.10.9-1.EL3.1.src.rpm
    
    i386:
    9d49bf8347c7959c5e25193017ace76d  ethereal-0.10.9-1.EL3.1.i386.rpm
    2c2783bacc7346d4e6c2e5e4ca03be7b  ethereal-gnome-0.10.9-1.EL3.1.i386.rpm
    
    ia64:
    4fc0567ea34cf3a2739eae5164716447  ethereal-0.10.9-1.EL3.1.ia64.rpm
    c2561995bed9ceae011ed0919ad20a1a  ethereal-gnome-0.10.9-1.EL3.1.ia64.rpm
    
    x86_64:
    6cd423bc315ba6512d502a42ea0704d4  ethereal-0.10.9-1.EL3.1.x86_64.rpm
    85a1ef6aa68b81f2eee6508b6fcf332c  ethereal-gnome-0.10.9-1.EL3.1.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and 
    details on how to verify the signature are available from
    https://www.redhat.com/security/team/key/#package
    
    7. References:
    
    http://www.ethereal.com/appnotes/enpa-sa-00016.html
    http://www.ethereal.com/appnotes/enpa-sa-00017.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1139
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1140
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1141
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1142
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0007
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0008
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0009
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0010
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0084
    
    8. Contact:
    
    The Red Hat security contact is .  More contact
    details at https://www.redhat.com/security/team/contact/
    
    Copyright 2005 Red Hat, Inc.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.76,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":12.93,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.31,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.