RedHat: ethereal multiple vulnerabilities
Summary
Summary
Ethereal is a program for monitoring network traffic.A number of security issues affect Ethereal. By exploiting these issues itmay be possible to make Ethereal crash or run arbitrary code by injecting apurposefully malformed packet onto the wire or by convincing someone toread a malformed packet trace file.Multiple off-by-one vulnerabilities exist in Ethereal 0.9.11 and earlier inthe AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3, Rsync, SMB, SMPP,and TSP dissectors. They do not properly use the tvb_get_nstringz andtvb_get_nstringz0 functions. Common Vulnerabilities and Exposures project(cve.mitre.org) has assigned the name CAN-2003-0356 to these issues.Multiple integer overflow vulnerabilities exist in Ethereal 0.9.11 andearlier in the Mount and PPP dissectors. (CAN-2003-0357)A vulnerability in the DCERPC dissector exists in Ethereal 0.9.12 andearlier, allowing remote attackers to cause a denial of service (memoryconsumption) via a certain NDR string. (CAN-2003-0428)The OSI dissector in Ethereal 0.9.12 and earlier causes by invalid IPv4 orIPv6 prefix lengths, possibly triggering a buffer overflow. (CAN-2003-0429)The SPNEGO dissector in Ethereal 0.9.12 and earlier allows remote attackersto cause a denial of service (crash) via an invalid ASN.1 value. (CAN-2003-0430)The tvb_get_nstringz0 function in Ethereal 0.9.12 and earlier does notproperly handle a zero-length buffer size. (CAN-2003-0431)Ethereal 0.9.12 and earlier does not handle certain strings properly in theBGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP, ISIS, and RMI dissectors.(CAN-2003-0432)Users of Ethereal should update to the erratum packages containing Etherealversion 0.9.13, which are not vulnerable to these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
Please note that this update is available via Red Hat Network. To use Red
Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed ( for more info):
85179 - SOCKS format string vuln in Ethereal 0.9.8/9
6. RPMs required:
Red Hat Linux 7.2:
SRPMS:
i386:
ia64:
Red Hat Linux 7.3:
SRPMS:
i386:
Red Hat Linux 8.0:
SRPMS:
i386:
Red Hat Linux 9:
SRPMS:
i386:
7. Verification:
MD5 sum Package Name
bd9ea773029a00543c2b86efd2f253db 7.2/en/os/SRPMS/ethereal-0.9.13-1.72.1.src.rpm
adda580cd763deba0940b47d2cb28f20 7.2/en/os/i386/ethereal-0.9.13-1.72.1.i386.rpm
dbe53fa5716f9cee9859c1d4435d2e76 7.2/en/os/i386/ethereal-gnome-0.9.13-1.72.1.i386.rpm
52f6b8ceacc3946743c116ea41af9651 7.2/en/os/ia64/ethereal-0.9.13-1.72.1.ia64.rpm
23de069f33cd2da4c40c60288ae9e10b 7.2/en/os/ia64/ethereal-gnome-0.9.13-1.72.1.ia64.rpm
189f889e31de3bb9efd06b55282f741e 7.3/en/os/SRPMS/ethereal-0.9.13-1.73.1.src.rpm
3bc7319ef3cf5dcd3fc491eb323bd473 7.3/en/os/i386/ethereal-0.9.13-1.73.1.i386.rpm
a7c84fc309ff33b5666de9f298946f6f 7.3/en/os/i386/ethereal-gnome-0.9.13-1.73.1.i386.rpm
ac016f9ed706b0cf8d75be2ccced0a4c 8.0/en/os/SRPMS/ethereal-0.9.13-1.80.1.src.rpm
3ab512b8de7c7ad17bf43b7b0d4307ed 8.0/en/os/i386/ethereal-0.9.13-1.80.1.i386.rpm
0f4961aa67c6540c735c9ed4959881ef 8.0/en/os/i386/ethereal-gnome-0.9.13-1.80.1.i386.rpm
28cd7262e8f2d814bec2a871961d7444 9/en/os/SRPMS/ethereal-0.9.13-1.90.1.src.rpm
7253c66d80ce49bc79c0cd8749c710e3 9/en/os/i386/ethereal-0.9.13-1.90.1.i386.rpm
3d3394064db2d9ece3568b6af251575a 9/en/os/i386/ethereal-gnome-0.9.13-1.90.1.i386.rpm
These packages are GPG signed by Red Hat for security. Our key is
available from Product Signing Keys - Red Hat Customer Portal
You can verify each package with the following command:
rpm --checksig -v
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
md5sum
Package List
Topic
Topic
Updated Ethereal packages available to fix a number of remotely
exploitable security issues
Relevant Releases Architectures
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386
Bugs Fixed