RedHat: Moderate: ethereal security update RHSA-2005:037-01
Summary
Summary
Ethereal is a program for monitoring network traffic. A number of security flaws have been discovered in Ethereal. On a system where Ethereal is running, a remote attacker could send malicious packets to trigger these flaws. A flaw in the DICOM dissector could cause a crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1139 to this issue. A invalid RTP timestamp could hang Ethereal and create a large temporary file, possibly filling available disk space. (CAN-2004-1140) The HTTP dissector could access previously-freed memory, causing a crash. (CAN-2004-1141) An improperly formatted SMB packet could make Ethereal hang, maximizing CPU utilization. (CAN-2004-1142) The COPS dissector could go into an infinite loop. (CAN-2005-0006) The DLSw dissector could cause an assertion, making Ethereal exit prematurely. (CAN-2005-0007) The DNP dissector could cause memory corruption. (CAN-2005-0008) The Gnutella dissector could cause an assertion, making Ethereal exit prematurely. (CAN-2005-0009) The MMSE dissector could free static memory, causing a crash. (CAN-2005-0010) The X11 protocol dissector is vulnerable to a string buffer overflow. (CAN-2005-0084) Users of Ethereal should upgrade to these updated packages which contain version 0.10.9 that is not vulnerable to these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
144188 - CAN-2004-1139 Ethereal flaws (CAN-2004-1140 CAN-2004-1141 CAN-2004-1142)
145483 - CAN-2005-0006 multiple ethereal issues (CAN-2005-0007 CAN-2005-0008 CAN-2005-0009 CAN-2005-0010 CAN-2005-0084)
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
98adae2cb40674c2da7bc19d1788b38e ethereal-0.10.9-1.EL4.1.src.rpm
i386:
2d813b3bb16b56c6142a56b83d62da4e ethereal-0.10.9-1.EL4.1.i386.rpm
d50a4b284c96a523f1d29d3e42b729e4 ethereal-gnome-0.10.9-1.EL4.1.i386.rpm
ia64:
dd815b3dd40251338ade17fa6b7cb603 ethereal-0.10.9-1.EL4.1.ia64.rpm
741f5eccaa7c14a7ef02acec35b01fb4 ethereal-gnome-0.10.9-1.EL4.1.ia64.rpm
ppc:
0c02256756928dcb3a43b776ae1aa8fb ethereal-0.10.9-1.EL4.1.ppc.rpm
96834137b6929162596795ac56322e7a ethereal-gnome-0.10.9-1.EL4.1.ppc.rpm
s390:
750e58ab013b38908d989ba00b8c006d ethereal-0.10.9-1.EL4.1.s390.rpm
f53e3e172467d9d41b9b8ef292aca8b5 ethereal-gnome-0.10.9-1.EL4.1.s390.rpm
s390x:
8b9ad8f8dec08ef07fa9012976c6282a ethereal-0.10.9-1.EL4.1.s390x.rpm
80c90b967616f9e450c03158e15bc120 ethereal-gnome-0.10.9-1.EL4.1.s390x.rpm
x86_64:
a8614ae5539dc9a504c46d73bd422d68 ethereal-0.10.9-1.EL4.1.x86_64.rpm
3f24ccf818fb3fefc2b1bac4794cd702 ethereal-gnome-0.10.9-1.EL4.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
98adae2cb40674c2da7bc19d1788b38e ethereal-0.10.9-1.EL4.1.src.rpm
i386:
2d813b3bb16b56c6142a56b83d62da4e ethereal-0.10.9-1.EL4.1.i386.rpm
d50a4b284c96a523f1d29d3e42b729e4 ethereal-gnome-0.10.9-1.EL4.1.i386.rpm
x86_64:
a8614ae5539dc9a504c46d73bd422d68 ethereal-0.10.9-1.EL4.1.x86_64.rpm
3f24ccf818fb3fefc2b1bac4794cd702 ethereal-gnome-0.10.9-1.EL4.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
98adae2cb40674c2da7bc19d1788b38e ethereal-0.10.9-1.EL4.1.src.rpm
i386:
2d813b3bb16b56c6142a56b83d62da4e ethereal-0.10.9-1.EL4.1.i386.rpm
d50a4b284c96a523f1d29d3e42b729e4 ethereal-gnome-0.10.9-1.EL4.1.i386.rpm
ia64:
dd815b3dd40251338ade17fa6b7cb603 ethereal-0.10.9-1.EL4.1.ia64.rpm
741f5eccaa7c14a7ef02acec35b01fb4 ethereal-gnome-0.10.9-1.EL4.1.ia64.rpm
x86_64:
a8614ae5539dc9a504c46d73bd422d68 ethereal-0.10.9-1.EL4.1.x86_64.rpm
3f24ccf818fb3fefc2b1bac4794cd702 ethereal-gnome-0.10.9-1.EL4.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
98adae2cb40674c2da7bc19d1788b38e ethereal-0.10.9-1.EL4.1.src.rpm
i386:
2d813b3bb16b56c6142a56b83d62da4e ethereal-0.10.9-1.EL4.1.i386.rpm
d50a4b284c96a523f1d29d3e42b729e4 ethereal-gnome-0.10.9-1.EL4.1.i386.rpm
ia64:
dd815b3dd40251338ade17fa6b7cb603 ethereal-0.10.9-1.EL4.1.ia64.rpm
741f5eccaa7c14a7ef02acec35b01fb4 ethereal-gnome-0.10.9-1.EL4.1.ia64.rpm
x86_64:
a8614ae5539dc9a504c46d73bd422d68 ethereal-0.10.9-1.EL4.1.x86_64.rpm
3f24ccf818fb3fefc2b1bac4794cd702 ethereal-gnome-0.10.9-1.EL4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1139 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1140 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1141 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1142 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0006 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0007 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0008 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0009 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0010 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0084
Package List
Topic
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Bugs Fixed