GLSA: ethereal

From: Daniel Ahlberg (alizat_private)
Date: Fri Aug 30 2002 - 01:22:44 PDT

  • Next message: Martin O'Neal: "RE: Macromedia Shockwave Flash Malformed Header Overflow"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT
    - - --------------------------------------------------------------------
    
    PACKAGE        :ethereal
    SUMMARY        :buffer overflow
    DATE           :2002-08-30 07:30 UTC
    
    - - --------------------------------------------------------------------
    
    OVERVIEW
    
    The ISIS protocol dissector in Ethereal 0.9.5 and earlier versions
    is susceptible to a buffer overflow.
    
    DETAIL
    
    It may be possible to make Ethereal crash or hang by injecting a
    purposefully malformed packet onto the wire, or by convincing someone
    to read a malformed packet trace file. It may be possible to make
    Ethereal run arbitrary code by exploiting the buffer and pointer problems.
    
    The full advisory can be read at
    http://www.ethereal.com/appnotes/enpa-sa-00006.html
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-analyzer/ethereal-0.9.5-r2 and earlier update their systems
    as follows:
    
    emerge rsync
    emerge ethereal
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE9bytUfT7nyhUpoZMRAms+AKCUt6lH8p4gYd+1D92rf3mod3YpuwCeJRSa
    l4axUEqXgrW1U46/R5V8SN8=
    =N0in
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Fri Aug 30 2002 - 09:05:35 PDT