GLSA: ethereal (200303-10)

From: Daniel Ahlberg (alizat_private)
Date: Sun Mar 09 2003 - 12:12:45 PST

  • Next message: jelmer: "Re: .MHT Buffer Overflow in Internet Explorer"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - ---------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200303-10
    - - ---------------------------------------------------------------------
    
              PACKAGE : ethereal
              SUMMARY : arbitrary code execution
                 DATE : 2003-03-09 20:12 UTC
              EXPLOIT : remote
    VERSIONS AFFECTED : <0.9.10
        FIXED VERSION : >=0.9.10
                  CVE : 
    
    - - ---------------------------------------------------------------------
    
    - From advisory:
    "The SOCKS dissector in Ethereal 0.9.9 is susceptible to a format 
    string overflow. This vulnerability has been present in Ethereal since 
    the SOCKS dissector was introduced in version 0.8.7. It was discovered 
    by Georgi Guninski. Additionally, the NTLMSSP code is susceptible to a 
    heap overflow. All users of Ethereal 0.9.9 and below are encouraged 
    to upgrade. "
    
    Read the full advisory at:
    http://www.ethereal.com/appnotes/enpa-sa-00008.html
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-analyzer/ethereal upgrade to ethereal-0.9.10 as follows:
    
    emerge sync
    emerge ethereal
    emerge clean
    
    - - ---------------------------------------------------------------------
    alizat_private - GnuPG key is available at http://cvs.gentoo.org/~aliz
    - - ---------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQE+a6A1fT7nyhUpoZMRAj6oAJ4wd+WBsHQEgFEuf22fWAueD6zjgACfV1uT
    rUKVwwCzAPiovynpwUE5N9c=
    =sn9d
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Tue Mar 11 2003 - 13:31:45 PST