-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated Ethereal packages fix security issues Advisory ID: RHSA-2004:001-01 Issue date: 2004-01-07 Updated on: 2004-01-07 Product: Red Hat Linux Keywords: Cross references: Obsoletes: RHSA-2003:323 CVE Names: CAN-2003-1012 CAN-2003-1013 - --------------------------------------------------------------------- 1. Topic: Updated Ethereal packages that fix two security vulnerabilities are now available. 2. Relevant releases/architectures: Red Hat Linux 9 - i386 3. Problem description: Ethereal is a program for monitoring network traffic. Two security issues have been found that affect Ethereal. By exploiting these issues it may be possible to make Ethereal crash by injecting an intentionally malformed packet onto the wire or by convincing someone to read a malformed packet trace file. It is not known if these issues could allow arbitrary code execution. The SMB dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service via a malformed SMB packet that triggers a segmentation fault during processing of Selected packets. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-1012 to this issue. The Q.931 dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service (crash) via a malformed Q.931, which triggers a null dereference. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-1013 to this issue. Users of Ethereal should update to these erratum packages containing Ethereal version 0.10.0, which is not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. RPMs required: Red Hat Linux 9: SRPMS: ftp://updates.redhat.com/9/en/os/SRPMS/ethereal-0.10.0a-0.90.1.src.rpm i386: ftp://updates.redhat.com/9/en/os/i386/ethereal-0.10.0a-0.90.1.i386.rpm ftp://updates.redhat.com/9/en/os/i386/ethereal-gnome-0.10.0a-0.90.1.i386.rpm 6. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- cf02fe0315dcfa46f79c5fbf379a6225 9/en/os/SRPMS/ethereal-0.10.0a-0.90.1.src.rpm f7e4fe4f9a4cb47a2e6b42b5cfed5ce3 9/en/os/i386/ethereal-0.10.0a-0.90.1.i386.rpm 686d115defe1ec92cc7a49ffe80bfbe4 9/en/os/i386/ethereal-gnome-0.10.0a-0.90.1.i386.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum <filename> 7. References: http://www.ethereal.com/appnotes/enpa-sa-00012.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1012 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1013 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE//EwtXlSAg2UNWIIRAvMSAKCG38hxAsLkqcheRuhwk9o1YJPN5wCgg/ah pm/LZTXs0fVuRpmbbexJaxc= =c0ol -----END PGP SIGNATURE----- _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://www.redhat.com/mailman/listinfo/redhat-watch-list