[Full-Disclosure] [RHSA-2002:036-26] Updated ethereal packages available

From: bugzillaat_private
Date: Fri Sep 13 2002 - 12:10:23 PDT

  • Next message: Christopher Allene: "Security Issue with Mac OS X"

    ---------------------------------------------------------------------
                       Red Hat, Inc. Red Hat Security Advisory
    
    Synopsis:          Updated ethereal packages available
    Advisory ID:       RHSA-2002:036-26
    Issue date:        2002-02-27
    Updated on:        2002-09-12
    Product:           Red Hat Powertools
    Keywords:          ucd-snmp SNMP ethereal
    Cross references:  RHSA-2002:169 RHSA-2002:170
    Obsoletes:         RHSA-2000:116
    CVE Names:         CAN-2002-0012 CAN-2002-0013 CAN-2002-0353 CAN-2002-0401 CAN-2002-0402 CAN-2002-0403 CAN-2002-0404 CAN-2002-0821 CAN-2002-0822 CAN-2002-0834
    ---------------------------------------------------------------------
    
    1. Topic:
    
    Updated ethereal packages are available for Red Hat Powertools 6.2, 7, and
    7.1. These packages are required for the Red Hat Security Advisory
    regarding applications linked against the old ucd-snmp libraries and also
    fix other security issues in ethereal.
    
    2. Relevant releases/architectures:
    
    Red Hat Powertools 6.2 - alpha, i386
    Red Hat Powertools 7.0 - alpha, i386
    Red Hat Powertools 7.1 - alpha, i386
    
    3. Problem description:
    
    Ethereal is a network traffic analyzer and monitor.
    
    The Red Hat Security Advisory for ucd-snmp included updated libraries. All
    applications linked against the old ucd-snmp libraries need to be
    updated.
    
    If you have updated your ucd-snmp package you must update the ethereal
    package as well.
    
    For all other third party applications possibly affected by the Red Hat
    Security Advisory for ucd-snmp, please contact the software vendor.
    
    This errata provides Ethereal version 0.9.6. Previous versions of Ethereal
    were found to contain a number of security issues:
    
    Buffer overflow in Ethereal 0.9.5 and earlier allows remote attackers
    to cause a denial of service or execute arbitrary code via the ISIS
    dissector. (CAN-2002-0834)
    
    Buffer overflows in Ethereal 0.9.4 and earlier allow remote attackers
    to cause a denial of service or execute arbitrary code via the BGP
    dissector or the WCP dissector. (CAN-2002-0821)
    
    Ethereal 0.9.4 and earlier allows remote attackers to cause a denial
    of service and possibly excecute arbitrary code via the SOCKS, 
    RSVP, AFS, or LMP dissectors, which can be caused to core
    dump. (CAN-2002-0822)
    
    Due to improper string and error handling in Ethereal's ASN.1 parser, it
    is possible for a malformed SNMP or LDAP packet to cause a memory
    allocation or buffer overrun error in Ethereal versions before 0.9.2.
    (CAN-2002-0013 CAN-2002-0012)
    
    The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to
    cause a denial of service (crash) via a certain malformed packet, which
    causes Ethereal to allocate memory incorrectly, possibly due to zero-length
    fields. (CAN-2002-0353)
    
    The SMB dissector in Ethereal prior to version 0.9.2 allows remote
    attackers to cause a denial of service (crash) or execute arbitrary code
    via malformed packets that cause Ethereal to dereference a NULL pointer.
    (CAN-2002-0401)
    
    A buffer overflow in X11 dissector in Ethereal before 0.9.4 allows
    remote attackers to cause a denial of service (crash) and possibly
    execute arbitrary code while Ethereal is parsing keysyms. (CAN-2002-0402)
    
    The DNS dissector in Ethereal before 0.9.4 allows remote attackers to
    cause a denial of service (CPU consumption) via a malformed packet
    that causes Ethereal to enter an infinite loop. (CAN-2002-0403)
    
    A vulnerability in the GIOP dissector in Ethereal before 0.9.4 allows
    remote attackers to cause a denial of service (memory consumption).
    (CAN-2002-0404)
    
    4. Solution:
    
    Before applying this update, make sure all previously released errata
    relevant to your system have been applied.
    
    To update all RPMs for your particular architecture, run:
    
    rpm -Fvh [filenames]
    
    where [filenames] is a list of the RPMs you wish to upgrade.  Only those
    RPMs which are currently installed will be updated.  Those RPMs which are
    not installed but included in the list will not be updated.  Note that you
    can also use wildcards (*.rpm) if your current directory *only* contains the
    desired RPMs.
    
    Please note that this update is also available via Red Hat Network.  Many
    people find this an easier way to apply updates.  To use Red Hat Network,
    launch the Red Hat Update Agent with the following command:
    
    up2date
    
    This will start an interactive process that will result in the appropriate
    RPMs being upgraded on your system.
    
    5. RPMs required:
    
    Red Hat Powertools 6.2:
    
    SRPMS:
    ftp://updates.redhat.com/6.2/en/powertools/SRPMS/ethereal-0.9.6-0.6x.1.src.rpm
    
    alpha:
    ftp://updates.redhat.com/6.2/en/powertools/alpha/ethereal-0.9.6-0.6x.1.alpha.rpm
    
    i386:
    ftp://updates.redhat.com/6.2/en/powertools/i386/ethereal-0.9.6-0.6x.1.i386.rpm
    
    Red Hat Powertools 7.0:
    
    SRPMS:
    ftp://updates.redhat.com/7.0/en/powertools/SRPMS/ethereal-0.9.6-0.70.1.src.rpm
    
    alpha:
    ftp://updates.redhat.com/7.0/en/powertools/alpha/ethereal-0.9.6-0.70.1.alpha.rpm
    
    i386:
    ftp://updates.redhat.com/7.0/en/powertools/i386/ethereal-0.9.6-0.70.1.i386.rpm
    
    Red Hat Powertools 7.1:
    
    SRPMS:
    ftp://updates.redhat.com/7.1/en/powertools/SRPMS/ethereal-0.9.6-0.71.0.src.rpm
    
    alpha:
    ftp://updates.redhat.com/7.1/en/powertools/alpha/ethereal-0.9.6-0.71.0.alpha.rpm
    
    i386:
    ftp://updates.redhat.com/7.1/en/powertools/i386/ethereal-0.9.6-0.71.0.i386.rpm
    
    
    
    6. Verification:
    
    MD5 sum                          Package Name
    --------------------------------------------------------------------------
    7936bf855ae2e5da7b12f30148879b62 6.2/en/powertools/SRPMS/ethereal-0.9.6-0.6x.1.src.rpm
    bcc741008a4b03a0d91c5c785b717c34 6.2/en/powertools/alpha/ethereal-0.9.6-0.6x.1.alpha.rpm
    0d35acc730f5a829c2b59e43177e163a 6.2/en/powertools/i386/ethereal-0.9.6-0.6x.1.i386.rpm
    976a140cce141d776b890d8ba4402d76 7.0/en/powertools/SRPMS/ethereal-0.9.6-0.70.1.src.rpm
    c1cc49932d7463957db2564b5ea75583 7.0/en/powertools/alpha/ethereal-0.9.6-0.70.1.alpha.rpm
    2c4041ce90a8855fed84ba6ccc252b61 7.0/en/powertools/i386/ethereal-0.9.6-0.70.1.i386.rpm
    6c397fc396e74faf7e5db51c737efd6f 7.1/en/powertools/SRPMS/ethereal-0.9.6-0.71.0.src.rpm
    1321254dd072e1a88e0537d4fb5517d6 7.1/en/powertools/alpha/ethereal-0.9.6-0.71.0.alpha.rpm
    778c1919919ae46c44a17163e86f5393 7.1/en/powertools/i386/ethereal-0.9.6-0.71.0.i386.rpm
    
    
    These packages are GPG signed by Red Hat, Inc. for security.  Our key
    is available at:
        http://www.redhat.com/about/contact/pgpkey.html
    
    You can verify each package with the following command:
        rpm --checksig  <filename>
    
    If you only wish to verify that each package has not been corrupted or
    tampered with, examine only the md5sum with the following command:
        rpm --checksig --nogpg <filename>
    
    
    7. References:
    
    http://www.ethereal.com/appnotes/enpa-sa-00001.html
    http://www.ethereal.com/appnotes/enpa-sa-00003.html
    http://www.ethereal.com/appnotes/enpa-sa-00004.html 
    http://www.ethereal.com/appnotes/enpa-sa-00005.html
    http://www.ethereal.com/appnotes/enpa-sa-00006.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0012
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0013
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0353
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0401
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0402
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0403
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0404
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0821
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0822
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0834
    
    
    Copyright(c) 2000, 2001, 2002 Red Hat, Inc.
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Fri Sep 13 2002 - 12:35:23 PDT