[Full-Disclosure] [RHSA-2003:203-01] Updated Ethereal packages fix security issues

From: bugzillaat_private
Date: Thu Jul 03 2003 - 01:41:10 PDT

  • Next message: Richard M. Smith: "Software vendors just don't "get" ActiveX security"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Updated Ethereal packages fix security issues
    Advisory ID:       RHSA-2003:203-01
    Issue date:        2003-07-03
    Updated on:        2003-07-03
    Product:           Red Hat Linux
    Keywords:          ethereal SOCKS buffer overflow
    Cross references:  
    Obsoletes:         RHSA-2003:076
    CVE Names:         CAN-2003-0356 CAN-2003-0357 CAN-2003-0428 CAN-2003-0429 CAN-2003-0430 CAN-2003-0431 CAN-2003-0432
    - ---------------------------------------------------------------------
    
    1. Topic:
    
    Updated Ethereal packages available to fix a number of remotely
    exploitable security issues
    
    2. Relevant releases/architectures:
    
    Red Hat Linux 7.2 - i386, ia64
    Red Hat Linux 7.3 - i386
    Red Hat Linux 8.0 - i386
    Red Hat Linux 9 - i386
    
    3. Problem description:
    
    Ethereal is a program for monitoring network traffic.
    
    A number of security issues affect Ethereal.  By exploiting these issues it
    may be possible to make Ethereal crash or run arbitrary code by injecting a
    purposefully malformed packet onto the wire or by convincing someone to
    read a malformed packet trace file.
    
    Multiple off-by-one vulnerabilities exist in Ethereal 0.9.11 and earlier in
    the AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3, Rsync, SMB, SMPP,
    and TSP dissectors. They do not properly use the tvb_get_nstringz and
    tvb_get_nstringz0 functions.   Common Vulnerabilities and Exposures project
    (cve.mitre.org) has assigned the name CAN-2003-0356 to these issues.
    
    Multiple integer overflow vulnerabilities exist in Ethereal 0.9.11 and
    earlier in the Mount and PPP dissectors.  (CAN-2003-0357)
    
    A vulnerability in the DCERPC dissector exists in Ethereal 0.9.12 and
    earlier, allowing remote attackers to cause a denial of service (memory
    consumption) via a certain NDR string.  (CAN-2003-0428)
    
    The OSI dissector in Ethereal 0.9.12 and earlier causes by invalid IPv4 or
    IPv6 prefix lengths, possibly triggering a buffer overflow. (CAN-2003-0429)
    
    The SPNEGO dissector in Ethereal 0.9.12 and earlier allows remote attackers
    to cause a denial of service (crash) via an invalid ASN.1 value. 
    (CAN-2003-0430)
    
    The tvb_get_nstringz0 function in Ethereal 0.9.12 and earlier does not
    properly handle a zero-length buffer size. (CAN-2003-0431)
    
    Ethereal 0.9.12 and earlier does not handle certain strings properly in the
    BGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP, ISIS, and RMI dissectors.
    (CAN-2003-0432)
    
    Users of Ethereal should update to the erratum packages containing Ethereal
    version 0.9.13, which are not vulnerable to these issues.
    
    4. Solution:
    
    Before applying this update, make sure all previously released errata
    relevant to your system have been applied.
    
    Please note that this update is available via Red Hat Network.  To use Red
    Hat Network, launch the Red Hat Update Agent with the following command:
    
    up2date
    
    This will start an interactive process that will result in the appropriate
    RPMs being upgraded on your system.
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
    
    85179 - SOCKS format string vuln in Ethereal 0.9.8/9
    
    6. RPMs required:
    
    Red Hat Linux 7.2:
    
    SRPMS:
    ftp://updates.redhat.com/7.2/en/os/SRPMS/ethereal-0.9.13-1.72.1.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.2/en/os/i386/ethereal-0.9.13-1.72.1.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/ethereal-gnome-0.9.13-1.72.1.i386.rpm
    
    ia64:
    ftp://updates.redhat.com/7.2/en/os/ia64/ethereal-0.9.13-1.72.1.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/ethereal-gnome-0.9.13-1.72.1.ia64.rpm
    
    Red Hat Linux 7.3:
    
    SRPMS:
    ftp://updates.redhat.com/7.3/en/os/SRPMS/ethereal-0.9.13-1.73.1.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.3/en/os/i386/ethereal-0.9.13-1.73.1.i386.rpm
    ftp://updates.redhat.com/7.3/en/os/i386/ethereal-gnome-0.9.13-1.73.1.i386.rpm
    
    Red Hat Linux 8.0:
    
    SRPMS:
    ftp://updates.redhat.com/8.0/en/os/SRPMS/ethereal-0.9.13-1.80.1.src.rpm
    
    i386:
    ftp://updates.redhat.com/8.0/en/os/i386/ethereal-0.9.13-1.80.1.i386.rpm
    ftp://updates.redhat.com/8.0/en/os/i386/ethereal-gnome-0.9.13-1.80.1.i386.rpm
    
    Red Hat Linux 9:
    
    SRPMS:
    ftp://updates.redhat.com/9/en/os/SRPMS/ethereal-0.9.13-1.90.1.src.rpm
    
    i386:
    ftp://updates.redhat.com/9/en/os/i386/ethereal-0.9.13-1.90.1.i386.rpm
    ftp://updates.redhat.com/9/en/os/i386/ethereal-gnome-0.9.13-1.90.1.i386.rpm
    
    
    
    7. Verification:
    
    MD5 sum                          Package Name
    - --------------------------------------------------------------------------
    bd9ea773029a00543c2b86efd2f253db 7.2/en/os/SRPMS/ethereal-0.9.13-1.72.1.src.rpm
    adda580cd763deba0940b47d2cb28f20 7.2/en/os/i386/ethereal-0.9.13-1.72.1.i386.rpm
    dbe53fa5716f9cee9859c1d4435d2e76 7.2/en/os/i386/ethereal-gnome-0.9.13-1.72.1.i386.rpm
    52f6b8ceacc3946743c116ea41af9651 7.2/en/os/ia64/ethereal-0.9.13-1.72.1.ia64.rpm
    23de069f33cd2da4c40c60288ae9e10b 7.2/en/os/ia64/ethereal-gnome-0.9.13-1.72.1.ia64.rpm
    189f889e31de3bb9efd06b55282f741e 7.3/en/os/SRPMS/ethereal-0.9.13-1.73.1.src.rpm
    3bc7319ef3cf5dcd3fc491eb323bd473 7.3/en/os/i386/ethereal-0.9.13-1.73.1.i386.rpm
    a7c84fc309ff33b5666de9f298946f6f 7.3/en/os/i386/ethereal-gnome-0.9.13-1.73.1.i386.rpm
    ac016f9ed706b0cf8d75be2ccced0a4c 8.0/en/os/SRPMS/ethereal-0.9.13-1.80.1.src.rpm
    3ab512b8de7c7ad17bf43b7b0d4307ed 8.0/en/os/i386/ethereal-0.9.13-1.80.1.i386.rpm
    0f4961aa67c6540c735c9ed4959881ef 8.0/en/os/i386/ethereal-gnome-0.9.13-1.80.1.i386.rpm
    28cd7262e8f2d814bec2a871961d7444 9/en/os/SRPMS/ethereal-0.9.13-1.90.1.src.rpm
    7253c66d80ce49bc79c0cd8749c710e3 9/en/os/i386/ethereal-0.9.13-1.90.1.i386.rpm
    3d3394064db2d9ece3568b6af251575a 9/en/os/i386/ethereal-gnome-0.9.13-1.90.1.i386.rpm
    
    
    These packages are GPG signed by Red Hat for security.  Our key is
    available from http://www.redhat.com/security/keys.html
    
    You can verify each package with the following command:
        
        rpm --checksig -v <filename>
    
    If you only wish to verify that each package has not been corrupted or
    tampered with, examine only the md5sum with the following command:
        
        md5sum <filename>
    
    
    8. References:
    
    http://www.ethereal.com/appnotes/enpa-sa-00009.html
    http://www.ethereal.com/appnotes/enpa-sa-00010.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0356
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0357
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0428
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0429
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0430
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0431
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0432
    
    9. Contact:
    
    The Red Hat security contact is <secalertat_private>.  More contact
    details at http://www.redhat.com/solutions/security/news/contact.html
    
    Copyright 2003 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE/A+xHXlSAg2UNWIIRAiSzAJ4wLIpCBtj5OaeBperd8KyYn6sPygCgvgKX
    /PaF1t5blvDoZbttv6usTy4=
    =PgE5
    -----END PGP SIGNATURE-----
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Thu Jul 03 2003 - 02:03:10 PDT