Debian: 'ethereal' buffer overflow
Summary
Package : ethereal
Problem type : remote exploit
Debian-specific: no
hacksware reported a buffer overflow in the AFS packet parsing code in
ethereal. Gerald Combs then found more overflows in the netbios and ntp
decoding logic as well. An attacker can exploit those overflows by
sending carefully crafted packets to a network that is being monitored
by ethereal.
This has been fixed in version 0.8.0-2potato and we recommend you
upgrade your ethereal package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
Packages for m68k are not available at this momemt; when they
become available they will be announced on Debian -- Security Information
Source archives:
MD5 checksum: f82bd9c0d58077d360cc371e5cdc5de0
MD5 checksum: 01311d5c1a0e5facf93565970dcec04b
MD5 checksum: 297ae32cc23a154497dad6a1f964...