[RHSA-2004:378-01] Updated Ethereal packages fix security issues

bugzilla at redhat.com bugzilla at redhat.com
Thu Aug 5 16:39:00 UTC 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated Ethereal packages fix security issues
Advisory ID:       RHSA-2004:378-01
Issue date:        2004-08-05
Updated on:        2004-08-05
Product:           Red Hat Enterprise Linux
Obsoletes:         RHSA-2004:234
CVE Names:         CAN-2004-0633 CAN-2004-0634 CAN-2004-0635
- ---------------------------------------------------------------------

1. Summary:

Updated Ethereal packages that fix various security vulnerabilities are now
available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Ethereal is a program for monitoring network traffic.

The SNMP dissector in Ethereal releases 0.8.15 through 0.10.4 contained a
memory read flaw.  On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash or
possibly execute arbitrary code.  The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-0635 to this issue.

The SMB dissector in Ethereal releases 0.9.15 through 0.10.4 contained a
null  pointer flaw.  On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0634 to this issue.

The iSNS dissector in Ethereal releases 0.10.3 through 0.10.4 contained an
integer overflow flaw.  On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash or
possibly execute arbitrary code.  The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-0633 to this issue.

Users of Ethereal should upgrade to these updated packages, which contain
a version that is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/


5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

127381 - CAN-2004-0633/34/35 Multiple problems in Ethereal 0.10.4

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06  ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5  ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7  ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

ia64:
67c86c33f2f5052b695fb5308eb9ef37  ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600  ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06  ethereal-0.10.5-0.AS21.2.src.rpm

ia64:
67c86c33f2f5052b695fb5308eb9ef37  ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600  ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06  ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5  ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7  ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06  ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5  ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7  ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b  ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d  ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c  ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d  ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29  ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

ppc:
337260b85f120ac6c5c86e016c72f883  ethereal-0.10.5-0.30E.2.ppc.rpm
c320f1e59876983c783ee89190dbfa34  ethereal-gnome-0.10.5-0.30E.2.ppc.rpm

s390:
de6dcfb5cc97d4f60b76a8c5f785b5cd  ethereal-0.10.5-0.30E.2.s390.rpm
cb2b66afaeac23cea5570e3d63639e67  ethereal-gnome-0.10.5-0.30E.2.s390.rpm

s390x:
3a58d3ce6c36a8ed26acaf7d87ae99a3  ethereal-0.10.5-0.30E.2.s390x.rpm
5996b8a24b8a1fe531902caa66512a3f  ethereal-gnome-0.10.5-0.30E.2.s390x.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3  ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e  ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b  ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d  ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c  ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d  ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29  ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3  ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e  ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b  ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d  ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c  ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d  ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29  ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3  ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e  ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:

http://www.ethereal.com/appnotes/enpa-sa-00015.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0633
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0635

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBEmKsXlSAg2UNWIIRAvoMAKCs2vJUbX+cWSM94cJdpbryiw3LDgCgstOG
9jnGk4Fcu0pz7dhR9k2U1AQ=
=XUSM
-----END PGP SIGNATURE-----





More information about the Enterprise-watch-list mailing list