-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : ethereal SUMMARY : Fix for ethereal vulnerabilities DATE : 2003-11-07 16:08:00 ID : CLA-2003:780 RELEVANT RELEASES : 7.0, 8, 9 - ------------------------------------------------------------------------- DESCRIPTION Ethereal[1] is a powerful network traffic analyzer with a graphical user interface (GUI). This update announcement addresses several vulnerabilities[2] in ethereal versions prior to 0.9.16. These vulnerabilities can be exploited by an attacker who can insert crafted packets in the wire being monitored by ethereal or make an user open a trace file with such packets inside. Successful exploitation of these vulnerabilities can lead to denial of service conditions and/or remote execution of arbitrary code. The following vulnerabilities have been fixed in the 0.9.16 version: - buffer overflow in the GTP protocol dissector (CAN-2003-0925)[3] - denial of service with ISAKMP or MEGACO packets (CAN-2003-0926)[4] - buffer overflow in the SOCKS protocol dissector (CAN-2003-0927)[5] SOLUTION It is recommended that all ethereal users upgrade their packages. REFERENCES 1. http://www.ethereal.com/ 2. http://www.ethereal.com/appnotes/enpa-sa-00011.html 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0925 4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0926 5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2003-0927 UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/ethereal-0.9.16-1U70_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/ethereal-0.9.16-1U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/SRPMS/ethereal-0.9.16-1U80_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/ethereal-0.9.16-1U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/ethereal-common-0.9.16-1U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/ethereal-gtk-0.9.16-1U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/ethereal-utils-0.9.16-1U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/tethereal-0.9.16-1U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/SRPMS/ethereal-0.9.16-27097U90_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/ethereal-0.9.16-27097U90_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/ethereal-common-0.9.16-27097U90_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/ethereal-gtk-0.9.16-27097U90_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/ethereal-utils-0.9.16-27097U90_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/tethereal-0.9.16-27097U90_1cl.i386.rpm ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades: - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- Copyright (c) 2003 Conectiva Inc. http://www.conectiva.com - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE/q/Jo42jd0JmAcZARAn7zAJwLrkicGfcUEoEqyQl8R/lMxV+jpgCg759M Dvapdxhu/hFZaet/T3qfkyM= =skDY -----END PGP SIGNATURE-----