RHSA-2004:378-01: Updated Ethereal packages fix security issues
Posted on: 08/05/2004 03:18 PM

Updated Ethereal packages has been released for Red Hat Enterprise Linux

---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated Ethereal packages fix security issues
Advisory ID: RHSA-2004:378-01
Issue date: 2004-08-05
Updated on: 2004-08-05
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2004:234
CVE Names: CAN-2004-0633 CAN-2004-0634 CAN-2004-0635
----------------------------------------------------------------------

1. Summary:

Updated Ethereal packages that fix various security vulnerabilities are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Ethereal is a program for monitoring network traffic.

The SNMP dissector in Ethereal releases 0.8.15 through 0.10.4 contained a memory read flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0635 to this issue.

The SMB dissector in Ethereal releases 0.9.15 through 0.10.4 contained a null pointer flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0634 to this issue.

The iSNS dissector in Ethereal releases 0.10.3 through 0.10.4 contained an integer overflow flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0633 to this issue.

Users of Ethereal should upgrade to these updated packages, which contain a version that is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/


5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

127381 - CAN-2004-0633/34/35 Multiple problems in Ethereal 0.10.4

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

ia64:
67c86c33f2f5052b695fb5308eb9ef37 ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600 ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm

ia64:
67c86c33f2f5052b695fb5308eb9ef37 ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600 ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

ppc:
337260b85f120ac6c5c86e016c72f883 ethereal-0.10.5-0.30E.2.ppc.rpm
c320f1e59876983c783ee89190dbfa34 ethereal-gnome-0.10.5-0.30E.2.ppc.rpm

s390:
de6dcfb5cc97d4f60b76a8c5f785b5cd ethereal-0.10.5-0.30E.2.s390.rpm
cb2b66afaeac23cea5570e3d63639e67 ethereal-gnome-0.10.5-0.30E.2.s390.rpm

s390x:
3a58d3ce6c36a8ed26acaf7d87ae99a3 ethereal-0.10.5-0.30E.2.s390x.rpm
5996b8a24b8a1fe531902caa66512a3f ethereal-gnome-0.10.5-0.30E.2.s390x.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:

http://www.ethereal.com/appnotes/enpa-sa-00015.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0633
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0635

8. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.


Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/rhsa_2004378_01_updated_ethereal_packages_fix_security_issues.html)